Cover Image


View/Hide Left Panel

It would also be appropriate to join forces to prepare the necessary methodological materials explaining the practical expediency of intrusion-resistant architectures to stimulate market interest in the shift to using hardware and software that could form the basis for the creation of reliably protected systems. Finally, it would be expedient to work together on preparing well-honed recommendations on the creation of a standardized set of laws on cyberterrorism.

The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement