Skip to main content

Trust in Cyberspace (1999) / Chapter Skim
Currently Skimming:

Appendix F: Some Related Trustworthiness Studies
Pages 285-290

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.

From page 285...
... The report responded to prevailing conditions of limited awareness by the public, system developers, system operators, and policymakers. To help set and raise expectations about system security, the study recommended the following: · Development and promulgation of a comprehensive set of generally accepted security system principles (GSSP)
From page 286...
... The task force documented an increasing military dependence on networked information infrastructures, analyzed vulnerabilities of the current networked information infrastructure, discussed actual attacks on that infrastructure, and formulated a list of threats (Box F.1) that has been discussed broadly within the Department of Defense (DOD)
From page 287...
... The task force noted the low levels of activity concerning computer security and survivable systems at universities. CRITICAL FOUNDATIONS: PROTECTING AMERICA'S INFRASTRUCTURES The President's Commission on Critical Infrastructure Protection whose members were drawn from the private and public sector, studied infrastructures that are critical to the security, public welfare, and economic strength of the United States: information and communications (e.g., telecommunications)
From page 288...
... Federal support is crucial for sound business reasons, the private sector is not likely to invest significant resources in longer-term research that could fuel needed advances. The research and development vision articulated by the commission starts with $500 million for fiscal year 1999 and climbs to $1 billion in 2004 for government-sponsored basic research; and the vision has the private sector using that basic research to create new technology for infrastructure protection.
From page 289...
... Conflict between the protection of confidential information for legitimate businesses and lawabiding citizens and the need for law enforcement and intelligence agencies to obtain information has fueled a U.S. policy debate concerning both import/export restrictions and domestic deployment of cryptography.
From page 290...
... 1996. Report of the Defense Science Board Task Force on Information Warfare Defense (IW-D)

This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.