This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a road map for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.
This report assesses current (public domain) cyber security practices with respect to cyber indications and warnings. The information collected is in preparation for evaluation of the advantages of applying HPC technology to cybersecurity, as well as to identify other advances required to properly address this problem space.
We are living in an era in which terrorism demands our constant attention. Few people in North America or Western Europe have the capacity to study and analyze the wide scale number and kinds of threats facing us as a civilization. Even fewer can make constructive suggestions on how to meet and eliminate these threats in an effective way. Van Hipp discusses the full range of threats. Not just the constant threats of suicide bombers, airplane hijacking and odious beheadings, but the threats from military and cyber sources. He stresses the need to upgrade our missile defenses, protect ourselves from cyber attacks, and eliminate the dangers posed by our porous borders. He calls upon our national leadership to undertake the steps that will protect us all from these threats.
The world is increasingly connected. Smartphones are now capable of locking and unlocking our front doors, turning on lights, checking the camera for packages left on the doorstep. We are able to measure our steps, check our baby monitors, record our favorite programs from wherever we have connectivity. We will soon be able to commute to our offices in driverless cars, trains, buses, have our child's blood sugar checked remotely, and divert important energy resources from town to town efficiently. These are incredible potentially life-saving benefits that our society is learning to embrace, but we are also learning that these innovations do not come without a cost. In 2016, the internet encountered a denial of service attack on a scale never before seen. This attack effectively blocked access to popular sites like Netflix and Twitter by weaponizing unsecured network connected devices like cameras and DVRs. How do we make ourselves more secure without sacrificing the benefits of innovation and technological advances? A knee-jerk reaction might be to regulate the Internet of Things, but the United States cannot regulate the world. Standards applied to American-designed, American-manufactured, American-sold devices won't necessarily capture the millions of devices purchased by the billions of people around the world, so the vulnerabilities might remain. Any sustainable and effective solution will require input from all members of the ecosystem of the so-called Internet of Things.