Skip to main content

Currently Skimming:

6 Discussion of Information Technology and Communications Security
Pages 55-60

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 55...
... It gives a small number of relatively weak people extensive access to a lot of information, each other, potential recruits and sympathizers, and prospective targets. There is also a negative aspect of tightening access against terrorists or other malicious users more generally because it would compromise access and privacy for many, many more "good" users.
From page 56...
... The question of the adequacy of technical methods to police the Internet was raised, and whether a certain level of compulsion can be introduced, since companies were most reluctant to move in this direction. It was also asked whether there are other models of cybersecurity, perhaps derived from industry practices or from the quality assurance model.30 How do India and the United States compare or differ in their vulnerability to cyberattack?
From page 57...
... There is little e-commerce, with few Web transactions; if they fail there is still a parallel mechanism, simply using a phone. But in the United States, where many of the ecommerce Web sites are located, jamming these sites for about 2 hours leads to a loss of business, as the customer moves on to some other site.
From page 58...
... Regarding quality assurance models, Goodman's judgment was that not only quality assurance but also such things as insurance have both distributed risk and raised standards in sectors such as home, auto, and fire insurance, but no one has been able to think of good models for cyberrisk. In that context, what little you see of cyberinsurance in the United States tends to be in the form of insurance with very limited coverage and very high premiums because the insurance companies do not know what to do, in the absence of good data; they are experimenting, but experimenting on the side where any errors are likely to favor them.
From page 59...
... These included the U.S. Department of State's Bureau of Political and Military Affairs, White House Office of Cyber Security, National Communication System, Department of Defense, White House Office of Science and Technology, National Infrastructure Protection Center, Critical Infrastructure Assurance Office of the Department of Justice, Carnegie-Mellon University, Defense Advanced Research Projects Agency, and Idaho State University.
From page 60...
... organizations are statutorily tasked with certain responsibilities against terrorism, including cyberterrorism and infrastructure protection, this is not so in India, which has some way to go. This point was reiterated by Roddam Narasimha when he noted that the United States and India have different IT and communications infrastructure vulnerabilities, because they are at different stages of using networks.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.