and the use of cryptography, every computer or even every molecule could be given a traceable ownership.


The following items indicate priority areas for further research.

  • sensors for predictive analysis based on the flow at the backbone level

  • information sharing

  • data mining tools not only to predict attacks in advance, but also to predict low-intensity, long-duration attacks and the formation of groups

  • data mining to interlink apparently unconnected events

  • information fusion

  • recovery procedures and CERT-In

  • use of cryptography

The Lessons

In today’s borderless world, protecting the world is everyone’s business. Terrorism was once the problem of the developing nations. Today, it is everyone’s problem. If we see terrorism in some other part of the world and keep quiet, we will live to regret it, because it will reach our doorstep very soon.

Under Indo-U.S. collaboration, it is necessary to share our experiences and expertise in information and communication security. To begin this process, experts from the two countries could develop a framework to be used by governments in protecting the cyberspace of each nation. This framework could involve regulatory mechanisms, technologies for developing monitoring sensors and analysis capability to predict intrusions well in advance. The second major area for collaboration is the creation of cybersecurity awareness across a wide spectrum of users, including homemakers, students, corporations, software and hardware developers, vendors, and government officials. Such awareness would greatly facilitate our efforts to protect the infrastructures of both nations.

The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement