Skip to main content

Currently Skimming:

1 Why Care About Cybersecurity?
Pages 7-17

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 7...
... People's personal lives involve computing through social networking, home management, communication with family and friends, and management of personal affairs. The operation of medical devices implanted in human bodies is controlled by embedded (built-in)
From page 8...
... In this emerging era of truly pervasive computing, the ubiquitous integration of computing and communications technologies into common everyday objects enhances their usefulness and makes life easier and more convenient. Understanding context, personal information appliances will make appropriate information available on demand, enabling users to be more productive in both their personal and their professional lives.
From page 9...
... is about technologies, processes, and policies that help to prevent and/or reduce the negative impact of events in cyberspace that can happen as the result of deliberate actions against information technology by a hostile or malevolent actor. To go beyond this loosely stated definition of cybersecurity, it is necessary to elaborate on the meaning of "impact," on what makes impact "negative," and on what makes an actor "hostile" or "malevolent." By definition, an action that changes the functionality of a given information artifact (software or hardware)
From page 10...
... A full consideration of cybersecurity necessarily entails significant attention to process (how users of information technology actually use it) and policy (how the organizations of which users are a part ask, incentivize, or require their users to behave)
From page 11...
... The IT on which we rely is for the most part created, owned, and operated by the private sector, which means that improving the cybersecurity posture of the nation will require action by relevant elements of the private sector. Nonetheless, many parties believe that the government has an important role in helping to address cybersecurity problems, in much the same way that the government has many responsibilities for national security, law enforcement, and other problems of societal scale.
From page 12...
... Physical devices with embedded compromises can affect physical computing accept data from the physical systems and may cause death, world (through sensors such as cameras destruction, or physical damage. or thermometers)
From page 13...
... Criminal activity using cyber means includes cyber fraud and theft of services (e.g., stealing credit card numbers) ; cyber harassment and bullying (e.g., taking advantage of online anonymity to threaten a victim)
From page 14...
... Cyber espionage refers to national-level entities conducting espionage activities using cyber means to obtain important intelligence information relevant to national security (such as classified documents)
From page 15...
... could have a massive effect on public confidence, and thus certain types of attack that would not cause extensive actual damage must be considered to have some catastrophic potential as well. As far as is known publicly, actual destruction of or damage to physical property to date has been a relatively rare occurrence, although there have been many incidents in the other categories outlined above.
From page 16...
... Advocates of such measures either argue that their favored measures do not infringe on civil liberties, or assert that the infringements are small and relatively insignificant. In some cases, potential infringements arise because changes in information technology have gone beyond the technology base extant when important legal precedents were established.
From page 17...
... Because of the worldwide Internet and a global supply chain in which important elements of information technology are created, manufactured, and sold around the world, cyberspace does not have physical national borders. But the world is organized around nation-states and national governments, and every physical artifact of information technology is located somewhere.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.