Skip to main content

Currently Skimming:

Thoughts on Security and the NII
Pages 416-421

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 416...
... a safe computing and communications environment for individuals and to protect the commercial interests of the businesses beginning to establish themselves on the Internet. BACKGROUND The Internet is becoming an increasingly popular medium for delivering products, services, and personal communications.
From page 417...
... will become part of the Internet infrastructure, but it is unlikely that a separate, parallel network of networks we be constructed. The problems of malting Be Internet a safe computing environment will require significant research and development in the areas discussed above: threat and protection models, deterrents, and law-enforcement resources.
From page 418...
... referred to as the confrontation model. A new research activity at the San Diego Supercomputer Center, undertaken as a cooperative venture between academia, government, and industry, wall soon begin exploring an approach to information security based on confrontation in which we engage the intruder by using winning strategies within the scope of policy.
From page 419...
... Increasing the ability of existing enforcement structures to initiate and carry through successful prosecution of crimes that happen to involve computers and networks wait indirectly increase the deterrence to commit such crimes. This will require educating existing judicial personnel, as well as changes In policies and procedures, and increased resources as well.
From page 420...
... To be a viable platform for analyzing the confrontation paradigm, any proposed teethed must be a collection of hardware and software systems that encompass the complexity and extent of today' s networking infrastructure. The teethed wall be a heterogeneous collection of vendor computer platforms, network routers, switches, firewalis, operating systems, and network applications.
From page 421...
... Along with new technologies for fighting computer come wall come an increased burden for investigation. Education of law-enforcement agents to include computer crimes and methods wall help, but it seems inevitable that private computer security investigators wall play an Increasing role in He prevention, detection, and investigation of computer-related cnmes.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.