Skip to main content

Currently Skimming:

4 Accelerating Progress in Cybersecurity
Pages 29-34

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 29...
... Governments could make new efforts to protect information to the proper level, prioritize resources, and achieve both oversight and transparency.3 Trust has a technological dimension. For example, establishment of identity is being advanced in both the United Kingdom, with the Identity Assurance Programme, and the United States, with the National Strategy for Trusted Identities in Cyberspace program.
From page 30...
... National Security Agency generally has been able to get the people it needs, in part by identifying and attracting people with strong backgrounds and providing the necessary specialized training in cybersecurity. The signals intelligence agencies in both the United States and the United Kingdom work with colleges, universities, and schools to interest students in science, technology, engineering, and mathematics and demonstrate how these skills might be applied in government.
From page 31...
... For example, senior decision makers could be running desktop exercises in the boardroom or at the execu tive management level to test how their organizations would respond in times of a cyber crisis. They could disseminate informed and proactive messages about organizational resilience.
From page 32...
... Cyberse curity is a problem that cannot be fixed quickly or easily. Rather, many partial solutions and potentials paths forward exist and will need to be implemented, which will require collaboration, collective action, and -- most of all -- determination.
From page 33...
... : At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, 2014 Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment, 2008 Engaging Privacy and Information Technology in a Digital Age, 2007 Toward a Safer and More Secure Cyberspace, 2007 Trust in Cyberspace, 1999 Cryptography's Role in Securing the Information Society, 1996 Computers at Risk: Safe Computing in the Information Age, 1991


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.