This is a summary of discussions at a planning meeting held November 1-2, 2000 to examine the prospects of initiating an NRC study on cyber-security and the insider threat to classified information. The meeting's focus was on the threat to classified systems and information because the political and organizational issues that often arise with protection policies and practices (e.g., rights to privacy) are considerably fewer and less intense than if sensitive unclassified information (especially non-governmental information) is involved. The meeting also addressed threats other than insider threats as well as non-classified computer systems.
Table of Contents
|Cyber-Security and the Insider Threat to Classified Information||1-2|
|2. High-Grade Threats and High-Value Targets||3-5|
|3. Psychological, Social, Legal and Managerial Aspects of the Insider Threat||5-7|
|4. Technology, Present and Future||7-10|
|5. Options for CSTB||10-11|
|Appendix A: On the National Academies||12-12|
|Appendix B: List of Participants||13-13|
|Appendix C: Meeting Agenda||14-16|
The National Academies Press and the Transportation Research Board have partnered with Copyright Clearance Center to offer a variety of options for reusing our content. You may request permission to:
For most Academic and Educational uses no royalties will be charged although you are required to obtain a license and comply with the license terms and conditions.
For information on how to request permission to translate our work and for any other rights related query please click here.
For questions about using the Copyright.com service, please contact:
Copyright Clearance Center
22 Rosewood Drive
Danvers, MA 01923
Tel (toll free): 855/239-3415 (select option 1)