National Academies Press: OpenBook
Suggested Citation:"Front Matter." National Academy of Sciences. 2015. Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum. Washington, DC: The National Academies Press. doi: 10.17226/21833.
×

Cybersecurity Dilemmas

TECHNOLOGY, POLICY, AND INCENTIVES

SUMMARY OF DISCUSSIONS AT THE

2014 Raymond and Beverly Sackler

U.S.-U.K. Scientific Forum

cover

Suggested Citation:"Front Matter." National Academy of Sciences. 2015. Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum. Washington, DC: The National Academies Press. doi: 10.17226/21833.
×

FOREWORD

The introduction of the Internet and the World Wide Web has revolutionized the ways we work, socialize, shop, and access information. More and more aspects of our lives are being transferred online to create a world that is steadily more reliant on digital technology. A single global digital infrastructure has been created as a platform that must meet the diverse demands of different countries and sectors. As a result, cybersecurity is a growing concern for individuals, public and private organizations, and nations alike. More and more data are being shared and stored online, creating massive pools of personal information that are vulnerable to attack and exploitation by criminal and state actors.

The truly international nature of digital infrastructure creates a medium in which criminals can act maliciously, crossing borders with ease. As a result there are important international dimensions of cybersecurity and an increased need for communication and coordination between governments and companies, not just at a national level but also on a global scale. Cybersecurity is no longer solely the interest of cryptographers and software developers; it affects all of our lives, personal and professional.

The U.S. National Academy of Sciences and the Royal Society share a mission: to promote the use of science to benefit society and inform critical policy debates. This summary of the discussions that took place on the subject of cybersecurity on December 8 and 9, 2014, in Washington, D.C., will serve as a reference for decision makers, educators, and others seeking an overview of the cybersecurity dilemmas facing the world.

Since 2008, the Raymond and Beverly Sackler U.S.-U.K. scientific forums have sparked new excitement and enthusiasm for the exchange of ideas among thought leaders from the United States and United Kingdom on topics of worldwide scientific concern. This most recent forum, on cybersecurity, demonstrates how much remains to be achieved through collaboration and discussion between the two nations.

As presidents of the National Academy of Sciences and the Royal Society, we are pleased to introduce the latest piece of work supported by the Sacklers’ inspired generosity.

Dr. Ralph Cicerone   Sir Paul Nurse
President, National Academy of Sciences   President, Royal Society
Suggested Citation:"Front Matter." National Academy of Sciences. 2015. Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum. Washington, DC: The National Academies Press. doi: 10.17226/21833.
×
Page R1
Suggested Citation:"Front Matter." National Academy of Sciences. 2015. Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum. Washington, DC: The National Academies Press. doi: 10.17226/21833.
×
Page R2
Next: Contents »
Cybersecurity Dilemmas: Technology, Policy, and Incentives: Summary of Discussions at the 2014 Raymond and Beverly Sackler U.S.-U.K. Scientific Forum Get This Book
×
Buy Ebook | $9.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Individuals, businesses, governments, and society at large have tied their future to information technologies, and activities carried out in cyberspace have become integral to daily life. Yet these activities - many of them drivers of economic development - are under constant attack from vandals, criminals, terrorists, hostile states, and other malevolent actors. In addition, a variety of legitimate actors, including businesses and governments, have an interest in collecting, analyzing, and storing information from and about individuals and organizations, potentially creating security and privacy risks. Cybersecurity is made extremely difficult by the incredible complexity and scale of cyberspace. The challenges to achieving cybersecurity constantly change as technologies advance, new applications of information technologies emerge, and societal norms evolve.

In our interconnected world, cyberspace is a key topic that transcends borders and should influence (as well as be influenced by) international relations. As such, both national and international laws will need careful evaluation to help ensure the conviction of cybercriminals, support companies that work internationally, and protect national security. On December 8 and 9, 2014, the Raymond and Beverly Sackler U.S.-U.K. Scientific Forum "Cybersecurity Dilemmas: Technology, Policy, and Incentives" examined a broad range of topics including cybersecurity and international relations, privacy, rational cybersecurity, and accelerating progress in cybersecurity. This report summarizes the presentations and discussions from this forum.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!