Cover Image

PAPERBACK
$54.25



View/Hide Left Panel

The National Strategy to Secure Cyberspace.2 The working group also learned about NCSD’s priorities and mission—to secure cyberspace and U.S. cyberassets by implementing the strategy outlined in The National Strategy to Secure Cyberspace and priority protective measures to reduce the cybervulnerabilities of U.S. critical infrastructures. NCSD is divided into four organizational components: (1) U.S.-CERT operations, (2) outreach and awareness, (3) strategic initiatives, and (4) law enforcement and intelligence coordination.

NCSD’s international objectives include international cooperation with industry and critical infrastructure sectors; increased computer security incident response capabilities through training and technical assistance, adoption and implementation of principles described in OECD Guidelines for the Security of Information Systems and Networks: Toward a Culture of Security;3 and encouragement of other countries’ acceptance of the Council of Europe Convention on Cybercrime or individual laws at least as comprehensive (this becomes relevant when criminals are not physically within U.S. jurisdiction). Finally, the NCSD seeks a balance among government policy makers, law enforcement, and computer security incident response teams for international cooperation and collaboration.4

CERT Coordination Center. The CERT/CC connection to DHS was discussed, as well as trends in cybercrime. The malicious codes created to disturb the cyberenvironment are becoming more sophisticated. As a result, it is no longer possible to separate physical security and cybersecurity. Whether cyber or criminal threats are made, a better categorization than malicious activity in cyberspace needs to be created for them.5

D.C. Emergency Management Agency/Emergency Operations Center. The working group visited the Emergency Operations Center (EOC) of the D.C. Emergency Management Agency. Before September 11, 2001, the EOC was much smaller, with only 24 seats available for various response and critical infrastructure organizations. Not all of these seats had computers, and the computers that were in place were networked to one another but not outside the building. Since September 11, 2001, the EOC has been remodeled and can seat 50–60 representatives of the relevant response and critical infrastructure organi-

2

The Whitehouse. 2003. The National Strategy to Secure Cyberspace. Washington, D.C.: The White House. See http://www.whitehouse.gov/pcipb/cyberspace_strategy.pdf.

3

Organisation for Economic Co-Operation and Development. 2002. OECD Guidelines for the Security of Information Systems and Networks: Toward a Culture of Security. Paris, France: OECD.

4

Information taken from a presentation, National Cyber Security Division and U.S.-CERT— Overview, made by Liesyl Franz, Public Policy and International Affairs, National Cyber Security Division, U.S. Department of Homeland Security, on January 27, 2005 to the U.S.-Russian Working Group on Cyberterrorism Issues.

5

Information taken from a presentation to the U.S.-Russian Working Group on Cyberterrorism Issues by Casey Dunlevy, CERT/CC, January 28, 2005.



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement