Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Securing Cyberspace for the 44th Presidency

Securing Cyberspace for the 44th Presidency

Ratings:

4.5

(2)
|Views: 188|Likes:
Published by Gilligan Group Inc.
The Commission on Cyber-Security for the 44th Presidency released it's recommendations on December 8, 2008.
The Commission on Cyber-Security for the 44th Presidency released it's recommendations on December 8, 2008.

More info:

Published by: Gilligan Group Inc. on Dec 10, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less

05/09/2014

pdf

 
 
Securing Cyberspacefor the 44
th
Presidency
A Report of theCSIS Commission on Cybersecurity for the 44
th
Presidency
Cochairs:Representative James R. LangevinRepresentative Michael T. McCaulScott CharneyLt. General Harry Raduege, USAF (Ret)Project Director:James A. LewisCenter for Strategic and International StudiesWashington, DCDecember 2008
 
 
About CSIS
In an era of ever-changing global opportunities and challenges, theCenter for Strategic and International Studies (CSIS) providesstrategic insights and practical policy solutions to decisionmakers.CSIS conducts research and analysis and develops policyinitiatives that look into the future and anticipate change.Founded by David M. Abshire and Admiral Arleigh Burke atthe height of the Cold War, CSIS was dedicated to the simple buturgent goal of finding ways for America to survive as a nation andprosper as a people. Since 1962, CSIS has grown to become one of the world’s preeminent public policy institutions.Today, CSIS is a bipartisan, nonprofit organizationheadquartered in Washington, D.C. More than 220 full-time staff and a large network of affiliated scholars focus their expertise ondefense and security; on the world’s regions and the uniquechallenges inherent to them; and on the issues that know noboundary in an increasingly connected world.Former U.S. senator Sam Nunn became chairman of the CSISBoard of Trustees in 1999, and John J. Hamre has led CSIS as itspresident and chief executive officer since 2000.CSIS does not take specific policy positions; accordingly, allviews expressed herein should be understood to be solely those of the authors.© 2008 by Center for Strategic and International Studies,Washington, D.C.All rights reserved.1800 K Street, NWWashington, D.C. 20006202/775-3175
 
3
Contents
PrefaceExecutive Summary 1Summary of Recommendations 5Introduction The Hidden Battle 111 Create a Comprehensive National Security Strategyfor Cyberspace 172 Organizing for Cybersecurity 333 Rebuilding Partnership with the Private Sector 434 Regulate for Cybersecurity 495 Identity Management for Cybersecurity 616 Modernize Authorities 677 Build for the Future 71Conclusion Winning the Hidden Battle 77Appendix A Commission Members 79Appendix B Expert Advisors to the Working Groups 84Appendix C List of Briefings 85Appendix D List of Acronyms 89

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->