Add to Book Shelf
Flag as Inappropriate
Email this Book

Security in the Information Age

By Saxton, Jim

Click here to view

Book Id: WPLBN0000226457
Format Type: PDF eBook
File Size: 3.8 MB
Reproduction Date: 2008

Title: Security in the Information Age  
Author: Saxton, Jim
Volume:
Language: English
Subject: Government publications, Legislation., Government Printing Office (U.S.)
Collections: Government Library Collection
Historic
Publication Date:
Publisher: Government Printing Office

Citation

APA MLA Chicago

Saxton, J. (n.d.). Security in the Information Age. Retrieved from http://self.gutenberg.org/


Excerpt
Foreword: Over the years, the Joint Economic Committee has investigated a wide range of threats to the United States and its economy. The committee has consistently identified emerging issues including radio frequency weapons, bioterrorism, information warfare, espionage, technology transfers, transnational crime, and weapons proliferation. We continued that course in June 2001 with a hearing entitled, “Wired World: Cyber Security and the U.S. Economy.” Following this hearing, it became clear that we needed to better understand an increasingly complicated set of diffuse security threats. Senator Bennett volunteered to identify individuals whose perspectives about critical infrastructure protection would be of value to the Congress and compile a study. Computer networks connect and control everything from pipelines to stock exchanges. At a speech given on March 23, 2001, to the Partnership for Critical Infrastructure of the U.S. Chamber of Commerce, Condoleza Rice, United States National Security Advisor said, “Today, the cyber economy is the economy... Corrupt those networks and you disrupt this nation.”

Table of Contents
Table of Contents Foreword Security in the Information Age: We’re Not in Kansas Anymore Senator Robert F. Bennett . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Critical Infrastructure Assurance: A Conceptual Overview Kenneth I. Juster and John S. Tritak . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Cybersecurity Policy: Moving from Nouns to Verbs Mark Montgomery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 National Security in Transformation: Outlining a Comprehensive Approach to National Information Power William Gravell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Cyber Early Warning: Implications for Business Productivity and Economic Security David Keyes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Transition Between Law Enforcement and National Defense Scott Charney . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 The Definition and Integration of Law Enforcement and National Defense Efforts with Regard to Critical Infrastructure Protection Angeline Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Use of the Defense Production Act of 1950 for Critical Infrastructure Protection Lee M. Zeichner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 National Security: The Definitions Landscape Jack Oslund . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Counterintelligence and Infrastructure Protection John MacGaffin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Critical Infrastructure and Information Assurance: A Working Context and Framework Nancy Wong . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Information Protection: Assuring Stakeholder Value in a Digital Age Michael Rasmussen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.