You are on page 1of 35

Homeland Security: Securing Our

Nation’s Critical Infrastructure

Proposed Debate Topic 2009-2010

Presented to
The National Federation Debate Topic Selection Meeting
August 2008
Austin, Texas

Proposed by:
Ruth Kay
Detroit Country Day School
Beverly Hills, Michigan
Cyber Security Page 2 of 35

“A young computer whizz kid accidentally connects into a top secret super-computer
which has complete control over the U.S. nuclear arsenal. It challenges him to a game
between America and Russia, and he innocently starts the countdown to World War 3.”
(IMDB 2008)

You’re right if you guessed this was the plot of a 1983 Matthew Broderick movie
entitled War Games. But today, the scenario is all too real. Hackers, terrorists,
criminals and “computer whizz kids” are gaining access to some of our nation’s critical
infrastructures. The access that they can achieve is both amazing and frightening.

Clearly, we are a nation at risk. Something needs to be done to protect the computer
systems and networks that control our infrastructure.

THE PROBLEM

Computer technology is a part of every facet of our lives. We rely on it for the laptops
that we won’t go anywhere without to the computer systems that control our nuclear
weapons. None of these systems are self contained. All are dependent on a connection
outside of their own system. It is this outside connection that leaves them vulnerable to
intrusion. A government report, A National Strategy to Secure Cyberspace explains this
technological reliance,

For the United States, the information technology revolution quietly changed the
way business and government operate. Without a great deal of thought about
security, the Nation shifted the control of essential processes in manufacturing,
utilities, banking, and communications to networked computers. As a result, the
cost of doing business dropped and productivity skyrocketed. The trend toward
greater use of networked systems continues.
By 2003, our economy and national security became fully dependent upon
information technology and the information infrastructure. A network of networks
directly supports the operation of all sectors of our economy—energy (electric
power, oil and gas), transportation (rail, air, merchant marine), finance and banking,
information and telecommunications, public health, emergency services, water,
chemical, defense industrial base, food, agriculture, and postal and shipping. The
reach of these computer networks exceeds the bounds of cyberspace. They also
control physical objects such as electrical transformers, trains, pipeline pumps,
chemical vats, and radars. (2003)

Ever since the computer modem became widely available, people have been attempting
to “hack” into other computer systems. Some do it for just the thrill of the
accomplishment; others “hack” for more sinister purposes. These are the individuals that
cost private citizens, businesses and governments billions of dollars with no end in site.
Ralph Logan, of the Logan Group, a cybersecurity firm was quoted in the Washington
Post this past January as saying:
Cyber Security Page 3 of 35

Over the past year to 18 months, there has been "a huge increase in focused attacks
on our national infrastructure networks, . . . and they have been coming from outside
the United States," (2008)

Attacks on our critical infrastructure are not to be taken lightly. Homeland Security
Chief Michael Chertoff warned in 2007 that, "The consequences of an assault against
America's vast network of critical infrastructure sites could be dire, both in loss of life
and in economic impact…" Under Chertoff’s leadership the Department of Homeland
Security has identified seventeen areas as “critical infrastructure” that must be
protected.

Homeland Security Presidential Directive 7 identified 17 critical infrastructure and


key resource sectors that require protective actions to prepare for, or mitigate
against, a terrorist attack or other hazards. The sectors are: agriculture and food;
banking and finance; chemical; commercial facilities; commercial nuclear reactors,
including materials and waste; dams; defense industrial base; drinking water and
water treatment systems; emergency services; energy; government facilities;
information technology; national monuments and icons; postal and shipping; public
health and healthcare; telecommunications; and transportation systems including
mass transit, aviation, maritime, ground or surface, rail and pipeline systems. (2007)

Identification of the problem is not enough. Cyber attacks on our computer network can
have broad range consequences that we are ill prepared for. The federal government has
called for action and cooperation with the private sector but they have yet to set forth any
specific requirements. Kathryn Picanso of Fordham University School of Law points out
our vulnerability,

Network attacks can have serious ramifications on national security, as both the
military and the national economy are increasingly reliant on critical infrastructures
and information systems. n24 Critical infrastructures are "those physical and cyber-
based systems essential to the minimum operations of the economy and
government," n25 many of which are privately owned and operated. n26 Recognizing
that the failure to protect information networks could disrupt essential operations,
and cause loss of revenue, intellectual property, and even life, the federal
government has called for collaboration between industry, government, academia,
and nongovernmental groups to protect the nation's critical infrastructure, but has
stopped short of imposing specific security measures. n27 (2006)

Each one of the seventeen areas identified by Homeland Security pose a unique threat to
our economic lives and our national security. An attack on our banking and finance
system alone would cripple the nation. In a May 2007 report on Banking and Finance the
Department of Homeland Security outlined the importance of this sector of our lives.

The Banking and Finance Sector accounts for more than 8 percent of the U.S. annual
gross domestic product and is the backbone for the world economy. As direct attacks
Cyber Security Page 4 of 35

and public statements by terrorist organizations demonstrate, the sector is a high-value


and symbolic target. (2007)

Our nation’s energy supply is also at risk. In many instances our current level of
protection and the lack of a specific threat have lulled us into a false sense of security. A
report by Forbes Magazine brings reality to our complacency.

The first time Scott Lunsford offered to hack into a nuclear power station, he was told
it would be impossible. There was no way, the plant's owners claimed, that their
critical components could be accessed from the Internet. Lunsford, a researcher for
IBM's Internet Security Systems, found otherwise.

"It turned out to be one of the easiest penetration tests I'd ever done," he says. "By the
first day, we had penetrated the network. Within a week, we were controlling a
nuclear power plant. I thought, 'Gosh. This is a big problem.'" (2007)

Just imagine the havoc Lunsford could have caused if he had sinister motives. But wait,
we really don’t have to imagine it. The Midwest blackout of August 14, 2003, although
not intrusion related, gave us just a taste of what could really happen if a terrorist or other
intruder were to shut down our electrical grid. An article by Jeremy Johnson and Alex
Lefebvre outlines just some of the impact that the blackout had:

The blackout that began last Thursday, cutting electrical power to more than 50
million people in the US and Canada, exacted a heavy toll—causing not only
widespread inconvenience but threatening the safety, lives and economic well-being of
residents, as well as small and medium-sized businesses…

…However, in the days since the blackout, the human, environmental and economic
effects of the event continue to add up. The impact in the New York metropolitan
area—the nation’s financial center—was particularly sharp, with the city brought to a
standstill for a day and a half…

…Hospitals remained open, but without full power…

…Economic losses from the blackout exceeded $1 billion in New York City alone,
according to figures released Monday by city comptroller William Thompson. The
estimates include $800 million in unsold goods and services, as well as $250 million in
spoiled food…

…The blackout spread as far west as Michigan, causing widespread hardship,


pollution and economic losses in the Detroit area and parts of Ohio. Workers lost
wages, and businesses, especially restaurants and grocery stores, lost millions of
dollars in revenues and discarded supplies. The blackout compromised the water
supply in Detroit and Cleveland in at least two ways: first, by decreasing the pressure
in water pumps, allowing bacteria to build up in municipal water systems; second, by
effectively shutting down sewage treatment facilities…
Cyber Security Page 5 of 35

…Detroit-area food poisoning claims have skyrocketed since the power outage. A
family of 10 was stricken with food poisoning after eating in a Macomb County fast
food restaurant. Mount Clemens General Hospital in Macomb County reported that
one patient became ill after drinking tap water. Nine patients were admitted to the
emergency room at Beaumont Hospital in Royal Oak for food poisoning.

In another blackout-related pollution incident, FirstEnergy’s coal-fired power plant in


Eastlake, Ohio, spewed a huge cloud of ash over a more than half-mile radius from the
plant two hours before the blackouts began. Mike Tangora, a resident of nearby
Timberlake, told the Associated Press, “It was almost like it was snowing. We’ve been
here since 1962 and that’s the worst I’ve ever seen it.” (2003)

Johnson and Lefebvre just scratch the surface of the economic and safety impact of the
blackout. Whereas this blackout was not terrorist related, the threat of a terrorist attack in
this manner is all too real. The St. Petersburg Times reported:

In 2002, hackers in Venezuela were able to shut down part of that country's oil and
gas industry. Hackers have already caused multi-city blackouts outside the United
States, and there are indications that attempts have been made to breach vital power
systems within the country. (2008)

The threats to our security are growing exponentially and the government is not keeping
pace. National Security Czar Greg Garcia outlined some of the difficulty.

In an interview with Technology Daily, Garcia acknowledged that technology


improvements will create bigger security challenges as much of the world's
communications moves through a single, integrated Internet protocol over the next 10
years. Also, globalization of the information technology industry means more
opportunities to exploit vulnerabilities along the supply chain.
"There are cost savings, productivity enhancements, but it also introduces a new level
of vulnerability into our networks," said Garcia, who served as a vice president at the
Information Technology Association of America and also worked for other trade
associations and on Capitol Hill before taking his latest job.
Add those concerns to the current picture where the Cyber Security Industry Alliance
gives government agency cybersecurity efforts a D grade, and cyber threats are
growing exponentially, he said. (2007)

Clearly, we are a nation at risk. The question is what is being done to prevent disaster?

CURRENT EFFORTS

Much of our critical infrastructure is owned and/or operated by the private sector.
Therefore, the initial government response has been to leave protection to the private
sector. The difficulty is that the first concern of the private sector is what’s best for
business not necessarily what’s best for society or national security. Authors Michael
Gallaher, Albert Link and Brent Rowe in their book Cyber Security: Economic
Cyber Security Page 6 of 35

Strategies and Public Policy Alternatives explain the problem with private sector
solutions.

However, private sector organisations do not have the information they need to
make efficient decisions from a private perspective -- what’s in their best interest --
or a social perspective -- what’s in the best interest of society. They collect what
information they can with given resources, and then make decisions based on their
budget constraints.

In some cases, they may underestimate the costs imposed by security breaches,
however, there is no research to support the assertion that they are not acting in
their best interest given the information they have available.

Since September 11th the government has tried to elevate the importance of cyber
security. The myriad of government agencies, commissions, and councils assigned to
oversee our cyber security read like alphabet soup and include: the NIPP (National
Infrastructure Protection Program), SSPs (Sector Specific Plans), US_CERT (United
States Computer Emergency Readiness Team), CSSP (Control Systems Security
Program), NCSD (National Cyber Security Division) and a whole host of others. The job
of most of these agencies is to oversee, report and prescribe ways that private industry
can respond to cyber threats and attacks. The government does little to actually regulate
and require protocol for computer/network security. The Department of Homeland
Security has outlined the role the government should play in cyber security.

The Secretary of DHS will have important responsibilities in cyberspace security.


These responsibilities include:

• Developing a comprehensive national plan for securing the key resources and
critical
infrastructure of the United States;
• Providing crisis management in response to attacks on critical information systems;
• Providing technical assistance to the private sector and other government entities
with respect to emergency recovery plans for failures of critical information systems;
• Coordinating with other agencies of the federal government to provide specific
warning information and advice about appropriate protective measures and
countermeasures to state, local, and nongovernmental organizations including the
private sector, academia, and the
public; and
• Performing and funding research and development along with other agencies
that will lead to new scientific understanding and technologies in support of
homeland security.
Consistent with these responsibilities, DHS will become a federal center of excellence
for cybersecurity and provide a focal point for federal outreach to state, local, and on
governmental organizations including the private sector, academia and the public.
(DHS 2003)
Cyber Security Page 7 of 35

The reactionary nature of our official response has caused an outcry by some for the
government to take a much more proactive role in cyber security. According to
Gallaher, Link and Rowe the government role has been limited to motivating industry
to adopt new technologies and protections, “In the past, government has attempted to
develop and motivate the use of new technologies or standards that would improve
security.” But more is needed. The government needs to take the lead in regulating
industries responsible for our critical infrastructure to avoid disaster. A Forbes
Magazine article “America’s Hackable Backbone”, August 2007, argues that private
sector control of computer systems so vital to our critical infrastructure may not be in
the nation’s best interest.

… U.S. infrastructure [is] open to crippling attacks by criminal hackers or


cyberterrorists, says Jim Christy, director of future exploration at the Department of
Defense's Cyber Crime Center. "This is an Achille's heel for several of our critical
systems," Christy says. "Nation-states and terrorist organizations are definitely
looking at this as an option, a weapon of mass disruption."

That kind of risk means major security changes are necessary, says Christy. But
because SCADA [Supervisory Control and Data Acquisition software] systems are
largely owned by the private sector, critical infrastructure like power plants and water
systems may remain vulnerable until the problem affects profits--or leads to disaster.
Christy argues that we can't wait that long: His unofficial opinion is that SCADA
needs government regulation.

"The government mandates fire sprinklers. Those cost builders money, but they save
property and lives," he says. "If critical infrastructure is important to our national
security, shouldn't there be minimum standards it has to meet?"

Current efforts by the government and private sector have failed to provide the necessary
security for the computer systems and networks that control the very technological
backbone of our nation. Much work needs to be done.

In the end of the movie War Games [spoiler alert], Matthew Broderick is able to teach the
computer the ultimate futility of a nuclear attack by teaching it tic-tac-toe. Unfortunately,
the solution to the cyber security of nation’s critical infrastructure is never going to be as
simple as a game of tic-tac-toe.
Cyber Security Page 8 of 35

NFHS CRITERIA FOR DEBATE TOPICS

Resolutions:

1. Resolved that the United States federal government should substantially increase
the cyber security of critical infrastructures in the United States

2. Resolved that the United States federal government should substantially increase
cyber security in one or more of the following areas: defense industrial base,
banking and finance, transportation

3. Resolved that the United States federal government should establish a policy
substantially increasing cyber security in one or more of the following areas:
defense industrial base, banking and finance, transportation

4. Resolved that the United States federal government should establish a policy
substantially increasing the cyber security of our nation’s critical infrastructures

5. Resolved that the United States federal government should substantially increase
the cyber security of our nation’s critical infrastructures

6. Resolved that the United States federal government should substantially increase
protection of the computer systems and networks supporting critical infrastructure
in the United States

7. Resolved that the United States federal government should substantially


strengthen cyberspace protection of United States’ critical infrastructure

Timeliness: The debate over the security of our critical infrastructure has never been timelier. The
threat of new terrorist attacks based in technology is real and frightening. Not only are terrorist a concern
but criminals interested in record theft or extortion and even your average kid with a computer and desire to
hack have become threats to our privacy, security and livelihoods. There has been a sufficient time since
the terrorist attacks of 9/11 for the government to turn their attention to cyber security of our infrastructure,
but little has been done. The government has begun some efforts and we are beginning to see just how
ineffective these efforts are in securing our technology.

Scope: Since the topic involves United States cyber security it can impact a wide variety of areas from
transportation to banking to our defense industry. The topic also impacts the country as a whole. There
isn’t any one part of our nation that would be immune to the impact a breach in cyber security would have
on our critical infrastructure. It could also have a personal impact on individuals. The big Midwest
blackout of 2003 showed us just how much we rely on just one part of our critical infrastructure, our
electrical grid. Moreover, it has implications outside of the United States in the form of terrorism,
international relations, and trade. The scope of this topic makes it uniquely debatable for any high school
in the nation.

Range: The topic provides opportunities for debaters of all experience and skill levels. There will be
good debate on all of the stock issues along with counterplan ground and critical arguments. Debaters can
choose to delve into a rights debate, utilitarianism, crime and/or terrorism. Novice debaters will find a host
of policy impacts based on our vulnerability and the probability of terrorist or criminal attack on our
Cyber Security Page 9 of 35

infrastructure. Varsity debaters will be challenged by critical argumentation or the depth of such arguments
as the interrelationship of government action and economic/free market forces.

Quality: The quality of the debate on the topic of cyber security is not at all lacking. Debaters will be
dealing with real world issues that face our government, private sector businesses and individual citizens.
The wealth of information available and the interest that most teens have in technology will ensure that
debates are lively and the argumentation is solid.

Material: I don’t think I’ve seen a topic in the recent past that rivals this one in terms of availability of
information. The technological nature of the topic makes it fertile ground for internet research. The topic
is about the internet and computer networks so the internet is the home of a whole host of private and
government reports, technology magazines and journals and a variety of websites by everyone with an
opinion. But the research is not limited to the internet. The immediacy of the topic has fostered a plethora
of books and print material on the subject. Hardly a day goes by where you can’t pick up a newspaper and
see some article regarding the cyber security of our nation’s infrastructure.

Interest: Technology, computers, internet, hacking…need we say more. This is a teenagers’ dream
topic. But the beauty of this topic is that as educators we can take that interest and focus it in a way that
allows our students to see more than just the inconvenience (or life changing disaster of their world) when
ITunes fall victim to a hacker. Students can learn how the technological world is interrelated with
government and industry along with how it reaches far beyond their computer keyboard and Google chat.

Balance: The wide variety of negative arguments along with the variations of affirmative plan options
proves this a very balanced topic area. We have the affirmative option of government action mechanisms in
the form of implementing standards, improving physical structures, and/or training personnel. These
mechanisms can be utilized in a variety of areas from banking and finance to our defense industries. While
the negative has the ground of rights versus government action, state action, free market/private sector
action, business and economic arguments. Both sides in the debate may be arguing trade, international
relations, world economy impacts etc. A more specific list of affirmative and negative areas is included
below.

POSSIBLE AFFIRMATIVE AREAS POSSIBLE NEGATIVE AREAS


Any one of the 17 critical infrastructures Federalism
Banking and finance Hegemony
Identity theft States
Stock market International actors
Federal reserve system Economic disadvantages
Defense suppliers Business confidence disadvantages
Weapons security and integrity Private sector action
Planes, Trains, Automobiles Politics disadvantages
Terrorism impacts Terrorism
Organized crime impacts Organized Crime
Modeling International relations
Security hardware/software Agency counterplans
Personnel training Executive order counterplans
Security standards Biopower
Breach monitoring Critical tech arguments
Breach reporting Statism
Breach responses Privacy
Research and Development Rights
Cyber Security Page 10 of 35

TOPIC SPECIFIC DEFINITIONS


NOTE: Definitions for common resolutional terms such as United States and federal government are
available on request—but they would have made this a very long paper to include them here.

Banking
Definitions of banking on the Web:

• engaging in the business of keeping money for savings and checking accounts or for exchange or
for issuing loans and credit etc.
• transacting business with a bank; depositing or withdrawing funds or requesting a loan etc.
wordnet.princeton.edu/perl/webwn
• A banker or bank is a financial institution that acts as a payment agent for customers, and borrows
and lends money. ...
en.wikipedia.org/wiki/Banking
• The Banking (Special Provisions) Act 2008 (2008 c. 2) is an Act of the United Kingdom that was
introduced in order to enable the UK government to nationalise high-street banks under
emergency circumstances by secondary legislation. ...
en.wikipedia.org/wiki/Banking (Special Provisions) Act 2008
• including Banks, Credit Cards, Currency, and Travellers Cheques
smartphone-software.handster.com/programs.php

Dictionary.com Unabridged (v 1.1)


bank·ing
–noun
1. the business carried on by a bank or a banker.
2. banking as a profession.

American Heritage Dictionary -


bank 1
n.

1. A piled-up mass, as of snow or clouds. See Synonyms at heap.


2. A steep natural incline.
3. An artificial embankment.
4. The slope of land adjoining a body of water, especially adjoining a river, lake, or channel.
Often used in the plural.
5. A large elevated area of a sea floor. Often used in the plural.
6. Games The cushion of a billiard or pool table.
7. The lateral inward tilting, as of a motor vehicle or an aircraft, in turning or negotiating a
curve.

v. banked, bank·ing, banks

v. tr.

1. To border or protect with a ridge or embankment.


2. To pile up; amass: banked earth along the wall.
3. To cover (a fire), as with ashes or fresh fuel, to ensure continued low burning.
Cyber Security Page 11 of 35

4. To construct with a slope rising to the outside edge: The turns on the racetrack were steeply
banked.
5.
a. To tilt (an aircraft) laterally and inwardly in flight.
b. To tilt (a motor vehicle) laterally and inwardly when negotiating a curve.
6. Games To strike (a billiard ball) so that it rebounds from the cushion of the table.
7. Sports To play (a ball or puck) in such a way as to make it glance off a surface, such as a
backboard or wall.

v. intr.

1. To rise in or take the form of a bank.


2. To tilt an aircraft or a motor vehicle laterally when turning.

WordNet -
banking

noun
1. engaging in the business of keeping money for savings and checking accounts or for exchange or for
issuing loans and credit etc.
2. transacting business with a bank; depositing or withdrawing funds or requesting a loan etc.

Webster's Revised Unabridged Dictionary -


Banking

Bank\, v. t. [imp. & p. p. Banked(b[a^][ng]kt); p. pr. & vb. n. Banking.]


1. To raise a mound or dike about; to inclose, defend, or fortify with a bank; to embank. "Banked well with
earth." --Holland.
2. To heap or pile up; as, to bank sand.
3. To pass by the banks of. [Obs.] --Shak.
To bank a fire, To bank up a fire, to cover the coals or embers with ashes or cinders, thus keeping the fire
low but alive.

Banking and Finance


Journal of Banking and Finance
The aim of the Journal of Banking and Finance is to provide an outlet for the increasing flow of scholarly
research concerning financial institutions and the money and capital markets within which they function.
The Journal's emphasis is on theoretical developments and their implementation, empirical, applied, and
policy-oriented research in banking and other domestic and international financial institutions and markets.
The Journal's purpose is to improve communications between, and within, the academic and other research
communities and policymakers and operational decision makers at financial institutions, both private and
public, national and international, and their regulators.
http://www.elsevier.com/wps/find/journaldescription.cws_home/505558/description#description

Nebraska Department of Banking and Finance


Official Nebraska Governement Website 2004
The Department of Banking was created by Nebraska legislators to regulate state-chartered banks and other
financial industries within the state. In 1939, regulation of state securities laws was also placed under the
Cyber Security Page 12 of 35

jurisdiction of the Department of Banking. Today, the Nebraska Department of Banking and Finance
regulates and supervises various financial industries on behalf of the State of Nebraska and its residents.

Control
Definitions of control on the Web:

• power to direct or determine; "under control"


• a relation of constraint of one entity (thing or person or group) by another; "measures for the
control of disease"; "they instituted controls over drinking on campus"
• (physiology) regulation or maintenance of a function or action or reflex etc; "the timing and
control of his movements were unimpaired"; "he had lost control of his sphincters"
• exercise authoritative control or power over; "control the budget"; "Command the military forces"
• control condition: a standard against which other conditions can be compared in a scientific
experiment; "the control condition was inappropriate for the conclusions he wished to draw"
• the activity of managing or exerting control over something; "the control of the mob by the police
was admirable"
• lessen the intensity of; temper; hold in restraint; hold or keep within limits; "moderate your
alcohol intake"; "hold your tongue"; "hold your temper"; "control your anger"
• dominance: the state that exists when one person or group has power over another; "her apparent
dominance of her husband was really her attempt to make him pay attention to her"
• operate: handle and cause to function; "do not operate machinery after imbibing alcohol"; "control
the lever"
• restraint: discipline in personal and social activities; "he was a model of polite restraint"; "she
never lost control of herself"
• manipulate: control (others or oneself) or influence skillfully, usually to one's advantage; "She
manipulates her boss"; "She is a very controlling mother and doesn't let her children grow up";
"The teacher knew how to keep the class in line"; "she keeps in line"
• check or regulate (a scientific experiment) by conducting a parallel experiment or comparing with
another standard; "Are you controlling for the temperature?"
• command: great skillfulness and knowledge of some subject or activity; "a good command of
French"
• verify by using a duplicate register for comparison; "control an account"
• a mechanism that controls the operation of a machine; "the speed controller on his turntable was
not working properly"; "I turned the controls over to her"
• a spiritual agency that is assumed to assist the medium during a seance
• see: be careful or certain to do something; make certain of something; "He verified that the valves
were closed"; "See that the curtains are closed"; "control the quality of the product"
• master: have a firm understanding or knowledge of; be on top of; "Do you control these data?"
• the economic policy of controlling or limiting or curbing prices or wages etc.; "they wanted to
repeal all the legislation that imposed economic controls"
wordnet.princeton.edu/perl/webwn
• In computing, control-\ is a control character in ASCII code, also known as the field separator
(FS) character. It is generated by pressing the key while holding down the key on a computer
keyboard.
en.wikipedia.org/wiki/Control-\

Dictionary.com Unabridged (v 1.1) -


con·trol -
, noun
–verb (used with object)
1. to exercise restraint or direction over; dominate; command.
Cyber Security Page 13 of 35

2. to hold in check; curb: to control a horse; to control one's emotions.


3. to test or verify (a scientific experiment) by a parallel experiment or other standard of comparison.
4. to eliminate or prevent the flourishing or spread of: to control a forest fire.
5. Obsolete. to check or regulate (transactions), originally by means of a duplicate register.
–noun
6. the act or power of controlling; regulation; domination or command: Who's in control here?
7. the situation of being under the regulation, domination, or command of another: The car is out of
control.
8. check or restraint: Her anger is under control.
9. a legal or official means of regulation or restraint: to institute wage and price controls.
10. a standard of comparison in scientific experimentation.
11. a person who acts as a check; controller.
12. a device for regulating and guiding a machine, as a motor or airplane.
13. controls, a coordinated arrangement of such devices.
14. prevention of the flourishing or spread of something undesirable: rodent control.
15. Baseball. the ability of a pitcher to throw the ball into the strike zone consistently: The rookie pitcher
has great power but no control.
16. Philately. any device printed on a postage or revenue stamp to authenticate it as a government issue or
to identify it for bookkeeping purposes.
17. a spiritual agency believed to assist a medium at a séance.
18. the supervisor to whom an espionage agent reports when in the field.

WordNet – Princeton University


control

noun
1. power to direct or determine; "under control"
2. a relation of constraint of one entity (thing or person or group) by another; "measures for the control of
disease"; "they instituted controls over drinking on campus"
3. (physiology) regulation or maintenance of a function or action or reflex etc; "the timing and control of
his movements were unimpaired"; "he had lost control of his sphincters"
4. a standard against which other conditions can be compared in a scientific experiment; "the control
condition was inappropriate for the conclusions he wished to draw" [syn: control condition]
5. the activity of managing or exerting control over something; "the control of the mob by the police was
admirable"
6. the state that exists when one person or group has power over another; "her apparent dominance of her
husband was really her attempt to make him pay attention to her" [syn: dominance]
7. discipline in personal and social activities; "he was a model of polite restraint"; "she never lost control
of herself" [syn: restraint] [ant: unrestraint]
8. great skillfulness and knowledge of some subject or activity; "a good command of French" [syn:
command]
9. a mechanism that controls the operation of a machine; "the speed controller on his turntable was not
working properly"; "I turned the controls over to her"
10. a spiritual agency that is assumed to assist the medium during a seance
11. the economic policy of controlling or limiting or curbing prices or wages etc.; "they wanted to repeal all
the legislation that imposed economic controls"

verb
1. exercise authoritative control or power over; "control the budget"; "Command the military forces"
2. lessen the intensity of; temper; hold in restraint; hold or keep within limits; "moderate your alcohol
intake"; "hold your tongue"; "hold your temper"; "control your anger"
Cyber Security Page 14 of 35

3. handle and cause to function; "do not operate machinery after imbibing alcohol"; "control the
lever" [syn: operate]
4. control (others or oneself) or influence skillfully, usually to one's advantage; "She manipulates her
boss"; "She is a very controlling mother and doesn't let her children grow up"; "The teacher knew how
to keep the class in line"; "she keeps in line" [syn: manipulate]
5. check or regulate (a scientific experiment) by conducting a parallel experiment or comparing with
another standard; "Are you controlling for the temperature?"
6. verify by using a duplicate register for comparison; "control an account"
7. be careful or certain to do something; make certain of something; "He verified that the valves were
closed"; "See that the curtains are closed"; "control the quality of the product" [syn: see]
8. have a firm understanding or knowledge of; be on top of; "Do you control these data?" [syn: master]

Critical infrastructures
Ian Patrick McGinley, Associate, Gibson, Dunn & Crutcher LLP. J.D, Yeshiva University Cardozo
Public Law, Policy & Ethics Journal Fall, 2007 p. ln
The definition of "critical infrastructure" varies as well. According to the Critical Infrastructure Protection
Act of 2001, critical infrastructures are "systems and assets, whether physical or virtual, so vital to the
United States that the incapacity or destruction of such systems and assets would have a debilitating impact
on security, national economic security, national public health or safety or any combination of those
matters." n81 President Bush's National Strategy for the Physical Protection of Critical Infrastructures and
Key Assets defines the term more specifically, pointing to thirteen separate sectors containing critical
infrastructure: agriculture, food, water, public health, emergency services, government, defense industrial
bases, information and telecommunications, energy, transportation, banking and finance, chemical industry
and hazardous materials, and postal and shipping. n82 In addition, the National Strategy for the Physical
Protection of Critical Infrastructure defines two types of key assets: (1) those whose destruction would
cause large scale casualties (e.g. nuclear power plants); and (2) those of symbolic national value (e.g.
monuments). n83 In total, there are well over one million critical infrastructures and key assets in the United
States; n84 defending them is an enormous and expensive task.

The White House, “December 17, 2003 Homeland Security Presidential Directive/Hspd-7”

Critical infrastructure and key resources provide the essential services that underpin American society. The
Nation possesses numerous key resources, whose exploitation or destruction by terrorists could cause
catastrophic health effects or mass casualties comparable to those from the use of a weapon of mass
destruction, or could profoundly affect our national prestige and morale. In addition, there is critical
infrastructure so vital that its incapacitation, exploitation, or destruction, through terrorist attack, could have
a debilitating effect on security and economic well-being.
http://www.whitehouse.gov/news/releases/2003/12/20031217-5.html

Cyber Infrastructure
NASCIO-Representing Chief Information Officers of the State “Strengthening Cyber Security in the
States” April 2008
This cyber infrastructure includes electronic information and communications systems, and the information
contained in those systems. These threat vectors continue to grow in numbers, as well as severity.
http://www.nascio.org/advocacy/dcFlyIn/callForAction08.pdf
Cyber Security Page 15 of 35

Cyber security
Definitions of cyber security on the Web:

• The branch of Security dealing with digital or information technology.


www.primode.com/glossary.html
• (or information security): The protection of information against unauthorized disclosure, transfer,
modification, or destruction, whether ...
www.state.mn.us/portal/mn/jsp/content.do

Cyber Security Research and Development Center, Department of Homeland Security, 2008
The Cyber Security R&D Center was established by the Department of Homeland Security in 2004 to
develop security technology for protection of the U.S. cyber infrastructure. http://www.cyber.st.dhs.gov/

Cyberspace
Thomas C. Folsom, Associate Professor, Regent University School of Law, “Defining Cyberspace
(Finding Real Virtue in the Place of Virtual Reality)” Tulane Journal of Technology & Intellectual
Property Spring, 2007 p. ln
The law has neither defined cyberspace nor its values. As a result, the attempt to apply legal rules of
"ordinary" space to cyberspace fails to address either the ordinary or the extraordinary features of the new
space. This Article proposes that cyberspace be defined as an embodied switched network for moving
information traffic, further characterized by degrees of access, navigation, information-activity,
augmentation (and trust). Legal conflicts, whether sounding in contract, trademark, copyright, personal
jurisdiction, choice of law, or some other basis, occasionally occur in an objective cyberspace whose values
can be sufficiently operationalized for legal analysis. If cyberspace were so defined, the law could better
respond to new technological uses.

Definitions of cyberspace on the Web:

• A term coined by author William Gibson. It describes the imaginary space in which computer
users travel when "surfing" the Internet.
www.greyfoxwebworks.com/webterms.html
• Any area beyond the realm of one's own computer to interact with other computer systems and/or
people.
marketconnect.bbandt.com/bbandt/internet_glosry_C.htm
• This is a term that gives us a way to sort of "see" what we are surfing while on the Net. It's a
generic term for the entire Internet, not just the World Wide Web.
www.elitehackers.info/glossary.php
• The global network of interconnected computers and communication systems.
www.psycom.net/iwar.2.html
• an internet word. All of the internet occurs in "cyberspace." return
www.california.com/~rathbone/local2.htm
• The universe created by computer networks.
www.rainwater.com/glossary/c.html
• The non-physical space where interaction takes place between computer networks.
web.worldbank.org/WBSITE/EXTERNAL/WBI/0,,contentMDK:20169611~isCURL:Y~menuPK:
654498~pagePK:209023~piPK:207535~theSitePK:213799,00.html

National Strategy to Secure Cyberspace, Department of Homeland Security, February 2003


Cyber Security Page 16 of 35

Cyberspace is their nervous system—the control system of our country. Cyberspace is composed of
hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that
allow our critical infrastructures to work.

American Heritage Dictionary 2004


cy·ber·space (sī'bər-spās')
n. The electronic medium of computer networks, in which online communication takes place.

WordNet Princeton University, 2008


cyberspace

noun
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network
protocols to facilitate data transmission and exchange [syn: internet]

American Heritage New Dictionary of Cultural Literacy, Third Edition


cyberspace

The space in which computer transactions occur, particularly transactions between different computers. We
say that images and text on the Internet exist in cyberspace, for example. The term is also often used in
conjunction with virtual reality, designating the imaginary place where virtual objects exist. For example, if
a computer produces a picture of a building that allows the architect to “walk” through and see what a
design would look like, the building is said to exist in cyberspace.

Free On-line Dictionary of Computing 2008


cyberspace jargon
/si:'ber-spays/ 1. (Coined by William Gibson) Notional "information-space" loaded with visual cues and
navigable with brain-computer interfaces called "cyberspace decks"; a characteristic prop of cyberpunk SF.
In 1991 serious efforts to construct virtual reality interfaces modelled explicitly on Gibsonian cyberspace
were already under way, using more conventional devices such as glove sensors and binocular TV
headsets. Few hackers are prepared to deny outright the possibility of a cyberspace someday evolving out
of the network (see network, the).
2. Occasionally, the metaphoric location of the mind of a person in hack mode. Some hackers report
experiencing strong eidetic imagery when in hack mode; interestingly, independent reports from multiple
sources suggest that there are common features to the experience. In particular, the dominant colours of this
subjective "cyberspace" are often grey and silver, and the imagery often involves constellations of
marching dots, elaborate shifting patterns of lines and angles, or moire patterns.

Defense industry
Definitions of defense industry on the Web:

• A wide ranging industry based on the production of military hardware and supplies such as
aircraft, ships, submarines, tanks, guns, bombs, bullets ...
www.moneymatters101.com/startingabusiness/bust/bustd.asp
• The defense industry, also called the military industry, is comprised of government and
commercial industry involved in research, development ...
en.wikipedia.org/wiki/Defense industry

DEFENSE INDUSTRY
Cyber Security Page 17 of 35

Wikipedia, http://en.wikipedia.org/wiki/Defense_industry

The defense industry, also called the military industry, is comprised of government and commercial
industry involved in research, development, production, and service of military equipment and facilities. It
includes:

• Defense contractors: business organizations or individuals that provide products or services to a


defense department of a government.
• The Arms industry, which produces guns, ammunition, missiles, military aircraft, and their
associated consumables and systems.

It can also include:

• Private military contractors: private companies that provide logistics, manpower, and other
expenditures for a military force.
• European defence procurement, which is more or less analogous to the U.S. "military-industrial
complex."

Defense Industrial Base


Bureau of Industry and Security, U.S. Department of Commerce 2008

http://www.bis.doc.gov/defenseindustrialbaseprograms/index.htm

BIS is the focal point within the Department of Commerce for developing, promoting, and implementing policies
that ensure a strong, technologically superior U.S. defense industrial base. Congressional mandates and executive
orders provide BIS with unique authorities to manage these program responsibilities.

Defense Priorities and Allocations System Program (DPAS)


BIS is responsible for ensuring the timely availability of industrial resources to meet current national defense and
emergency preparedness requirements with minimal disruption to commercial activities. DPAS also provides an
operating system to support rapid industrial response in a national emergency.

Defense Trade Advocacy


BIS is the lead U.S. Government agency that can offer advocacy support to U.S. companies competing in the
global defense market.

National Defense Industrial Association, Defense Industrial Base Critical Infrastructure


Protection Conference and Exhibition April 2007 http://www.dibcipconference.com/

Uninterrupted performance of those critical research and development, design,


production and maintenance activities collectively known as the “Defense Industrial
Base” (DIB) is critical to the Department of Defense ability to ensure the continuous
availability of those products and services critical to its world-wide mission.

Edmund B. Rice President, Coalition for Employment through Exports, IncCQ


Congressional Testimony, Committee on Senate Homeland Security and Governmental
Affairs Subcommittee on Oversight of Government Management, the Federal Workforce,
and the District of Columbia, April 24, 2008 p. ln
Cyber Security Page 18 of 35

Second, both the dual-use and munitions control systems have not been geared to
consider the effect of controls on the defense industrial base, which now includes both
defense contractors and commercial firms that supply off-the-shelf items for defense
purposes. All such firms must be able to survive in the commercial marketplace, but
export controls often are an obstacle to a successful business plan. Defense Department
acquisitions no longer are the sole determinant of long-term survival for the defense
industrial base. Current pending reforms in the control systems are essential to improving
the survivability of the defense industrial base.

Finance
Definitions of finance on the Web:

• the commercial activity of providing funds and capital


• obtain or provide money for; "Can we finance the addition to our home?"
• sell or provide on credit
• the management of money and credit and banking and investments
wordnet.princeton.edu/perl/webwn
• Finance studies and addresses the ways in which individuals, businesses, and organizations raise,
allocate, and use monetary resources over time, taking into account the risks entailed in their
projects. ...
en.wikipedia.org/wiki/Finance
• Finance is a board game originally released in 1932 by Knapp Electric and later reissued by Parker
Brothers. The game is similar to Monopoly in that the board is circular, has "Chance" cards,
properties can be purchased, and houses erected on them. ...
en.wikipedia.org/wiki/Finance (game)
• The management of money and other assets; : The science of management of money and other
assets; In plural (finances), the monetary resources, especially those of a public entity or a
company; To provide or obtain funding for a transaction or undertaking
en.wiktionary.org/wiki/finance
• The money needed by an individual or company to pay for something.
viewpointbank.mediaroom.com/index.php
• written instructions to pay money or surrender property a formal demand for payment, as by the
endorsement and presentment of a negotiable instrument by its specified payee
www.yourdictionary.com/order
• The science that describes the management of money, banking, credit, investments, and assets.
investor.cisco.com/glossary.cfm
• The interesting feature is a new approach to finance. (Function)
ccs.mit.edu/21c/iokey.html
• money to implement a project; it is usually used to mean money lent, or equity provided, by a
bank or similar financing institution (see ...
www.mos.gov.pl/mos/publikac/Raporty_opracowania/manual/glosry_1.html
• The functions of the Bank of Japan and other banks, securities companies and post offices, and a
look at emerging services and the influence of liberalization.
www.mofa.go.jp/j_info/japan/video/pamph.html
• As of June 30 each year, LEAs report the financial information regarding their system to the
Department of Education. The data is from the LEA general ledger. ...
www.k-12.state.tn.us/rptcrd02/rptcrdterms.asp
• money needed to create a production system and a product
www.ngfl-cymru.org.uk/vtc/forms_of_production/eng/Glossary/
Cyber Security Page 19 of 35

Dictionary.com Unabridged (v 1.1) -


fi·nance
–noun
1. the management of revenues; the conduct or transaction of money matters generally, esp. those
affecting the public, as in the fields of banking and investment.
2. finances, the monetary resources, as of a government, company, organization, or individual; revenue.
–verb (used with object)
3. to supply with money or capital; obtain money or credit for.
–verb (used without object)
4. to raise money or capital needed for financial operations.

WordNet -
finance

noun
1. the commercial activity of providing funds and capital
2. the branch of economics that studies the management of money and other assets
3. the management of money and credit and banking and investments

verb
1. obtain or provide money for; "Can we finance the addition to our home?"
2. sell or provide on credit

Webster's Revised Unabridged Dictionary - Cite This Source - Share This


Finance

Fi*nance"\, n. [F., fr. LL. financia payment of money, money, fr. finare to pay a fine or subsidy (cf. OF.
finer to finish, pay), fr. L. finis end. See Fine, n., Finish.]
1. The income of a ruler or of a state; revennue; public money; sometimes, the income of an individual;
often used in the plural for funds; available money; resources.
All the finances or revenues of the imperial crown. --Bacon.
2. The science of raising and expending the public revenue. "Versed in the details of finance." --Macaulay.

Improve
improve
vt.
1 [Now Rare] to use profitably or to good advantage !to improve one‘s leisure by studying"
2 to raise to a better quality or condition; make better
>3 to make (land or structures) more valuable by cultivation, construction, etc.
vi.
to become better in quality or condition
improve on (or upon) to do or make better than, as by additions or changes
SYN.—improve and better both imply a correcting or advancing of something that is not in itself necessarily bad, the former by
supplying a lack or want [to improve a method] and the latter by seeking something more satisfying [he‘s left his job to better
himself]; ameliorate implies a bad, oppressive, or intolerable condition to begin with [to ameliorate the lot of the poor] —ANT.
worsen, impair
(Webster's New World Dictionary. Accent Software International. Macmillan Publishers. Version 1.0 1997.)

Improve: to make or become better or of higher quality or value; to make or cause something to make progress Example: must
improve his appearance if he wants this job Example: Her health has improved lately
Cyber Security Page 20 of 35

(Concise Dictionary is © (1998,1999) AND Classification Data Ltd., Oxford, UK and database rights are © (1998,1999) AND
Classification Data Ltd. All rights reserved)

Improve
1. To disprove or make void; to refute
2. To disapprove; to find fault with; to reprove; to censure; as, to improve negligence.
(The Webster's Dictionary)

Improve
1. To make better; to increase the value or good qualities of; to ameliorate by care or cultivation; as, to improve land
2. To use or employ to good purpose; to make productive; to turn to profitable account; to utilize; as, to improve one's time; to
improve his means
3. To advance or increase by use; to augment or add to; -- said with reference to what is bad
4. To grow better; to advance or make progress in what is desirable; to make or show improvement; as, to improve in health.
5. To advance or progress in bad qualities; to grow worse
6. To increase; to be enhanced; to rise in value; as, the price of cotton improves
(The Webster's Dictionary)

im·prove
v. im·proved, im·prov·ing, im·proves
v. tr.
To raise to a more desirable or more excellent quality or condition; make better.
To increase the productivity or value of (land or property).
To put to good use; use profitably.
v. intr.
To become better.
To make beneficial additions or changes: improve on the translation
(The American Heritage® Dictionary of the English Language, Fourth Edition
Copyright © 2000 by Houghton Mifflin Company)

Networks
Definitions of networks on the Web:

• Networks are composed of complementary nodes and links. The crucial defining feature of
networks is the complementarity between the various nodes ...
www.stern.nyu.edu/networks/dictionary.html
• Networks are the essential means of linking one group of agents to others whom they affect. They
are the intricate links based on trust and reciprocal patterns of communication and exchange
between producers and clients that are necessary to ensure an economic capability and
responsiveness ...
www.rri.wvu.edu/WebBook/Danson/glossaryterms.htm
• Although there is no consensus definition of "program" or "networks", these terms are most often
encountered and understood in ...
www.genomicglossaries.com/content/printpage.asp
• A computer network is a group of computers that are linked so that information can travel between
the computers. The computers could be in the same room and linked via copper cables, or located
in different countries, linked by satellites, phone lines or fibre optic cables. ...
www.michigan.gov/cybersecurity/0,1607,7-217-34415---,00.html
• Two or more computers physically joined together so they can share files and information.
www.personal.psu.edu/bxb11/CBTGuide/Append/Gloss.htm

American Heritage Dictionary


net·work
n.

1. An openwork fabric or structure in which cords, threads, or wires cross at regular intervals.
2. Something resembling an openwork fabric or structure in form or concept, especially:
Cyber Security Page 21 of 35

a. A system of lines or channels that cross or interconnect: a network of railroads.


b. A complex, interconnected group or system: an espionage network.
c. An extended group of people with similar interests or concerns who interact and remain
in informal contact for mutual assistance or support.
d. A chain of radio or television broadcasting stations linked by wire or microwave relay.
e. A company that produces the programs for these stations.
f. A group or system of electric components and connecting circuitry designed to function
in a specific manner.
g. Computer Science A system of computers interconnected by telephone wires or other
means in order to share information. Also called net1.
3.
a. A chain of radio or television broadcasting stations linked by wire or microwave relay.
b. A company that produces the programs for these stations.
c. A group or system of electric components and connecting circuitry designed to function
in a specific manner.
d. Computer Science A system of computers interconnected by telephone wires or other
means in order to share information. Also called net1.
4.
a. A group or system of electric components and connecting circuitry designed to function
in a specific manner.
b. Computer Science A system of computers interconnected by telephone wires or other
means in order to share information. Also called net1.

The American Heritage Science Dictionary


network
A system of computers and peripherals, such as printers, that are linked together. A network can consist of
as few as two computers connected with cables or millions of computers that are spread over a large
geographical area and are connected by telephone lines, fiberoptic cables, or radio waves. The Internet is an
example of very large network. See more at LAN, WAN.

Our nation’s critical infrastructures


National Strategy to Secure Cyberspace, Department of Homeland Security, February 2003

Our Nation’s critical infrastructures are composed of public and private institutions in
the sectors of agriculture, food, water, public health, emergency services, government, defense industrial
base, information and telecommunications, energy, transportation, banking and finance, chemicals and
hazardous materials, and postal and shipping.

protection

Definitions of protection on the Web:

• the activity of protecting someone or something; "the witnesses demanded police protection"
• protective covering: a covering that is intend to protect from damage or injury; "they had no
protection from the fallout"; "wax provided protection for the floors"
• security: defense against financial failure; financial independence; "his pension gave him security
in his old age"; "insurance provided protection against loss of wages due to illness"
Cyber Security Page 22 of 35

• the condition of being protected; "they were huddled together for protection"; "he enjoyed a sense
of peace and protection in his new home"
• auspices: kindly endorsement and guidance; "the tournament was held under the auspices of the
city council"
• the imposition of duties or quotas on imports in order to protect domestic industry against foreign
competition; "he made trade protection a plank in the party platform"
• payment extorted by gangsters on threat of violence; "every store in the neighborhood had to pay
him protection"
wordnet.princeton.edu/perl/webwn

Dictionary.com Unabridged (v 1.1) 2008


pro·tec·tion
–noun
1. the act of protecting or the state of being protected; preservation from injury or harm.
2. a thing, person, or group that protects: This vaccine is a protection against disease.
3. PATRONAGE.
4. Insurance. COVERAGE (def. 1).
5. Informal.
a. money paid to racketeers for a guarantee against threatened violence.
b. bribe money paid to the police, politicians, or other authorities for overlooking criminal
activity.
6. Economics. PROTECTIONISM.
7. a document that assures safety from harm, delay, or the like, for the person, persons, or property
specified in it.
8. Archaic. a document given by the U.S. customs authorities to a sailor traveling abroad certifying that
the holder is a citizen of the U.S.

pro·tec·tion·al, adjective

—Synonyms 1. security, refuge, safety. 2. guard, defense, shield, bulwark. See COVER. 3. aegis,
sponsorship. 7. pass, permit.

American Heritage Dictionary 2008


pro·tec·tion
n.

1.
a. The act of protecting.
b. The condition of being protected.
c. Money extorted by racketeers threatening violence for nonpayment.
d. Bribes paid to officials by racketeers for immunity from prosecution.
2. One that protects.
3. A pass guaranteeing safe-conduct to travelers.
4. A system of tariffs or other measures protecting domestic producers from foreign competition.
5. A contraceptive or barrier that lowers the risk of pregnancy or infection, especially a condom.
6. Slang
a. Money extorted by racketeers threatening violence for nonpayment.
b. Bribes paid to officials by racketeers for immunity from prosecution.

.
WordNet Princeton University 2008
Cyber Security Page 23 of 35

protection

noun
1. the activity of protecting someone or something; "the witnesses demanded police protection"
2. a covering that is intend to protect from damage or injury; "they had no protection from the fallout";
"wax provided protection for the floors" [syn: protective covering]
3. defense against financial failure; financial independence; "his pension gave him security in his old age";
"insurance provided protection against loss of wages due to illness" [syn: security]
4. the condition of being protected; "they were huddled together for protection"; "he enjoyed a sense of
peace and protection in his new home"
5. kindly endorsement and guidance; "the tournament was held under the auspices of the city council" [syn:
auspices]
6. the imposition of duties or quotas on imports in order to protect domestic industry against foreign
competition; "he made trade protection a plank in the party platform"
7. payment extorted by gangsters on threat of violence; "every store in the neighborhood had to pay him
protection"

Webster's Revised Unabridged Dictionary 2008


Protection

Pro*tec"tion\, n. [L. protectio: cf. F. protection.]


1. The act of protecting, or the state of being protected; preservation from loss, injury, or annoyance;
defense; shelter; as, the weak need protection.
To your protection I commend me, gods. --Shak.
2. That which protects or preserves from injury; a defense; a shield; a refuge.
Let them rise up . . . and be your protection. --Deut. xxxii. 38.
3. A writing that protects or secures from molestation or arrest; a pass; a safe-conduct; a passport.
He . . . gave them protections under his hand. --Macaulay.
4. (Polit. Econ.) A theory, or a policy, of protecting the producers in a country from foreign competition in
the home market by the imposition of such discriminating duties on goods of foreign production as will
restrict or prevent their importation; -- opposed to free trade.
Writ of protection. (Law) (a) A writ by which the king formerly exempted a person from arrest; -- now
disused. [Eng.] --Blackstone. (b) A judicial writ issued to a person required to attend court, as party, juror,
etc., intended to secure him from arrest in coming, staying, and returning.
Syn: Preservation; defense; guard; shelter; refuge; security; safety.

Regulating
Regulate \Reg"u*late\ (-l[=a]t), v. t. [imp. & p. p. Regulated (- l[=a]`t[e^]d); p. pr. & vb.
n. Regulating.] [L. regulatus, p. p. of regulare, fr. regula. See Regular.] 1. To adjust by
rule, method, or established mode; to direct by rule or restriction; to subject to governing
principles or laws.
The laws which regulate the successions of the seasons. --Macaulay.
The herdsmen near the frontier adjudicated their own disputes, and regulated their own
police. --Bancroft.
2. To put in good order; as, to regulate the disordered state of a nation or its finances.
3. To adjust, or maintain, with respect to a desired rate, degree, or condition; as, to
regulate the temperature of a room, the pressure of steam, the speed of a machine, etc.
To regulate a watch or clock, to adjust its rate of running so that it will keep
approximately standard time.
Cyber Security Page 24 of 35

Syn: To adjust; dispose; methodize; arrange; direct; order; rule; govern.


(http://dictionary.reference.com/search?q=regulating)

Security vs Defense
Sean M. Condron, Associate Professor, International and Operational Law Harvard Journal of Law
and Technology Spring 2007 p. ln

Notwithstanding these definitional problems, government policy distinguishes between security and
defense. With these distinctions, the government emphasizes security over defense with regard to
cyberspace. The agency hierarchy is evidence of this priority. Under the National Strategy to Secure
Cyberspace, the Department of Homeland Security assumes the lead role for cyber security, n54 with the
Department of Defense relegated to a minor, supporting role. n55 Yet there is no comparable national
strategy for cyber defense. This oversight has left a gaping hole in the protection of United States critical
infrastructure because the Department of Homeland Security bases its concept of "security" on prevention
and repair, n56 whereas the concept of defense has traditionally entailed a wider range of options. This
section will outline some preliminary ideas about possible components that could be used to craft a cyber
defense strategy.

Supporting
Definitions of supporting on the Web:

• encouraging: furnishing support and encouragement; "the anxious child needs supporting and
accepting treatment from the teacher"
• support: the act of bearing the weight of or strengthening; "he leaned against the wall for support"
• load-bearing(a): capable of bearing a structural load; "a supporting wall"
wordnet.princeton.edu/perl/webwn
• the action of the verb to support; that supports
en.wiktionary.org/wiki/supporting
• statements--The lead-in is followed by supporting statements. This is the specific detailed
information.4bwtthe lead-in.
www.gaaged.org/Browseable_Folders/Curriculum/Lesson%20Plans/Agricultural%20Animal%20
Production%20&%20Management-01432/01432-
03.2%20Selection%20&%20Judging%20Beef%20Cattle.doc
• a structure used for the support of a monorail or crane system.
www.clevelandtramrail.com/info.asp

American Heritage Dictionary


sup·port
tr.v. sup·port·ed, sup·port·ing, sup·ports

1. To bear the weight of, especially from below.


2. To hold in position so as to keep from falling, sinking, or slipping.
3. To be capable of bearing; withstand: "His flaw'd heart . . . too weak the conflict to support"
(Shakespeare).
4. To keep from weakening or failing; strengthen: The letter supported him in his grief.
5. To provide for or maintain, by supplying with money or necessities.
Cyber Security Page 25 of 35

6. To furnish corroborating evidence for: New facts supported her story.


7.
a. To aid the cause, policy, or interests of: supported her in her election campaign.
b. To argue in favor of; advocate: supported lower taxes.
8. To endure; tolerate: "At supper there was such a conflux of company that I could scarcely support
the tumult" (Samuel Johnson).
9. To act in a secondary or subordinate role to (a leading performer).

n.

1.
a. The act of supporting.
b. The state of being supported.
2. One that supports.
3. Maintenance, as of a family, with the necessities of life.

WordNet Princeton University 2006


supporting

adjective
1. furnishing support and encouragement; "the anxious child needs supporting and accepting treatment
from the teacher" [syn: encouraging]
2. capable of bearing a structural load; "a supporting wall" [syn: load-bearing]

noun
1. the act of bearing the weight of or strengthening; "he leaned against the wall for support" [syn: support]

Strengthen
Definitions of strengthen on the Web:

• make strong or stronger; "This exercise will strengthen your upper body"; "strengthen the relations
between the two countries"
• gain strength; "His body strengthened"
• tone: give a healthy elasticity to; "Let's tone our muscles"
wordnet.princeton.edu/perl/webwn
• To make strong or stronger; to add strength to; to increase the strenght of; as, to strengthen a limb,
a bridge, an army; to strengthen an obligation; to strengthen authority; to fortify; to reinforce; To
animate; to give moral strength; to encourage; to fix in resolution; to hearten; To ...
en.wiktionary.org/wiki/strengthen

Dictionary.com Unabridged (v 1.1)


strength·en
–verb (used with object)
1. to make stronger; give strength to.
2. Phonetics. to change (a speech sound) to an articulation requiring more effort, as from fricative to stop
or nongeminate to geminate.
–verb (used without object)
3. to gain strength; grow stronger.

American Heritage Dictionary


Cyber Security Page 26 of 35

strength·en
v. strength·ened, strength·en·ing, strength·ens

v. tr.
To make strong or increase the strength of.

v. intr.
To become strong or stronger.

WordNet –Princeton University


strengthen

verb
1. make strong or stronger; "This exercise will strengthen your upper body"; "strengthen the relations
between the two countries" [ant: weaken]
2. gain strength; "His body strengthened" [ant: weaken]
3. give a healthy elasticity to; "Let's tone our muscles" [syn: tone]

Strengthen: To make or become strong or stronger. [Webster’s II New College Dictionary]

Strengthen: To make or become stronger. (New Oxford American Dictionary. Elizabeth J. Jewell & Frank Abate, editors. NY:
Oxford U., 2001, p. 1685)

Strengthen: To make strong or increase the strength of. (The American Heritage Dictionary of the English Language, 4th Ed.,
Boston: Houghton Mifflin, 2000, p. 1714)

Transportation
Definitions of transportation on the Web:

• transportation system: a facility consisting of the means and equipment necessary for the
movement of passengers or goods
• the act of moving something from one location to another
• fare: the sum charged for riding in a public conveyance
• Department of Transportation: the United States federal department that institutes and coordinates
national transportation programs; created in 1966
• the commercial enterprise of moving goods and materials
• exile: the act of expelling a person from their native land; "men in exile dream of hope"; "his
deportation to a penal colony"; "the expatriation of wealthy farmers"; "the sentence was one of
transportation for life"
wordnet.princeton.edu/perl/webwn
• Transport or transportation is the movement of people and goods from one place to another. The
term is derived from the Latin trans ("across") and portare ("to carry"). ...
en.wikipedia.org/wiki/Transportation
• In geology, transportation refers to the movement of eroded debris, whether by rivers, glaciers,
wind or ocean currents and tides. Particle sizes can vary from tiny clay particles suspended in
moving water, to pebbles and boulders. ...
en.wikipedia.org/wiki/Transportation (sediment)
• The act of transporting, or the state of being transported; conveyance, often of people, goods etc;
Deportation to a penal colony; A means of conveyance
en.wiktionary.org/wiki/transportation
Cyber Security Page 27 of 35

Dictionary.com Unabridged (v 1.1)


–noun
1. the act of transporting.
2. the state of being transported.
3. the means of transport or conveyance.
4. the business of conveying people, goods, etc.
5. price of travel or transport by public conveyance; fare.
6. tickets or permits for transport or travel.
7. banishment, as of a criminal to a penal colony; deportation.
8. (initial capital letter ) Also called Transportation Department. Informal. the Department of
Transportation.

American Heritage Dictionary -


trans·por·ta·tion
n.

1.
a. The act or an instance of transporting.
b. The state of being transported.
2. A means of conveyance.
3. The business of conveying passengers or goods.
4. A charge for public conveyance; fare.
5. Deportation to a penal colony.

WordNet -
transportation

noun
1. a facility consisting of the means and equipment necessary for the movement of passengers or
goods [syn: transportation system]
2. the act of moving something from one location to another
3. the sum charged for riding in a public conveyance [syn: fare]
4. the United States federal department that institutes and coordinates national transportation programs;
created in 1966 [syn: Department of Transportation]
5. the commercial enterprise of moving goods and materials
6. the act of expelling a person from their native land; "men in exile dream of hope"; "his deportation to a
penal colony"; "the expatriation of wealthy farmers"; "the sentence was one of transportation for
life" [syn: exile]
Cyber Security Page 28 of 35

Selected Bibliography of Consulted Works

Baker, John C. Mapping the Risks:. N.p.: Rand Corporation, 2004.

"banking." The American Heritage® Dictionary of the English Language, Fourth

Edition. Houghton Mifflin Company, 2004. 14 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/banking>.

"banking." WordNet® 3.0. Princeton University. 14 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/banking>.

"banking." Webster's Revised Unabridged Dictionary. MICRA, Inc. 14 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/banking>.

Canada, Ben. “Department of Homeland Security’ State and Local Preparedness Issues.”

CRS Web Report. 5 May 2003. Congressional Research Service. 4 Feb. 2008

<http://64.233.167.104/

search?q=cache:BFpNiLizjQcJ:www.law.umaryland.edu////_05052003.pdf+home

land+security+problems&hl=en&ct=clnk&cd=59&gl=us >.

Carafano, James Jay. The Reserves and Homeland Security: Proposals, Progress,

Problems Ahead. 6 June 2002. The Center for Strategic and Budgetary

Assessments. 4 Feb. 2008 <http://www.csbaonline.org/

4Publications//.20020619.The_Reserves_and_H/.20020619.The_Reserves_and_H

.php>.

"control." Dictionary.com Unabridged (v 1.1). Random House, Inc. 13 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/control>.

"control." WordNet® 3.0. Princeton University. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/control>.
Cyber Security Page 29 of 35

Cooper, Christopher, and Robert Block. Disaster: Hurricane Katrina and the Failure of

Homeland Security. N.p.: Macmillian, 2006.

"cyberspace." The American Heritage® Dictionary of the English Language, Fourth

Edition. Houghton Mifflin Company, 2004. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/cyberspace>.

"cyberspace." WordNet® 3.0. Princeton University. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/cyberspace>.

"cyberspace." The American Heritage® New Dictionary of Cultural Literacy, Third

Edition. Houghton Mifflin Company, 2005. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/cyberspace>.

"cyberspace." The Free On-line Dictionary of Computing. Denis Howe. 13 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/cyberspace>.

Department of Homeland Security Issues Final Regulations on Social Security Number

No-Match Letters. Aug. 2007. Form I-9 Compliance. 4 Feb. 2008

<http://www.formi9.com//GTAlert_DHSRegsonSSNNo-

MatchNumbers_Aug2007.pdf>.

"DHS Completes Key Framework for Critical Infrastructure Protection." Homeland

Security. 21

May 2007. Department of Homeland Security. 3 July 2008

<http://www.dhs.gov/xnews/releases/ pr_1179773665704.shtm>.

“Documents: How Homeland Made Its Antiterror Grants.” Newsweek 12 June 2006: 6.

LexisNexis Academic. LexisNexis. 4 Feb. 2008 <http://web.lexis-nexis.com/>.


Cyber Security Page 30 of 35

“Draft Homeland Security Strategy Adds Offensive Needs to Game Plan.” Defense Daily

7 Sept. 2007. LexisNexis Academic. LexisNexis. 4 Feb. 2008 <http://web.lexis-

nexis.com/>.

Eisenberg, Carol. “Restructuring Security.” Newsday 10 Oct. 2007: a24. LexisNexis

Academic. LexisNexis. 4 Feb. 2008 <http://web.lexis-nexis.com/>.

"finance." Dictionary.com Unabridged (v 1.1). Random House, Inc. 14 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/finance>.

"finance." WordNet® 3.0. Princeton University. 14 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/finance>.

"finance." Webster's Revised Unabridged Dictionary. MICRA, Inc. 14 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/finance>.

Forest, James J.F, and Joanne C Moore. Homeland Security and Terrorism. N.p.:

McGraw-Hill Professional, 2006.

General Accounting Office. Homeland Security: Information Sharing Responsibilities,

Challenges, and Key Management Issues. Washington D.C.: Diane Publishing,

2007.

Greenfield, Heather. "Homeland Security cyber czar sees challenges ahead." Government

Executive.com. 22 Feb. 2007. National Journal's Technology Daily. 2 July 2008

<http://www.govexec.com/dailyfed/0207/022207tdpm1.htm>.

Hall, James. Homeland Security Should Be a Goal, Not a Bureaucracy. 12 June 2002.

The American Partisan. 4 Feb. 2008 <http://www.american-partisan.com////qtr2/

.htm>.
Cyber Security Page 31 of 35

“Homeland Security.” The White House. 2008. United States Government. 4 Feb. 2008

<http://www.whitehouse.gov///>.

“Homeland Security Vacancies Called ‘Enormous’ Security Risk.” TechWeb (July

2007). LexisNexis Academic. LexisNexis. 4 Feb. 2008 <http://web.lexis-

nexis.com/>.

Hudson, Audrey. “Legislators eye agency makeover: Homeland’s handling of Katrina

hit.” Washington Times 20 Feb. 2006: a04. LexisNexis Academic. LexisNexis. 4

Feb. 2008 <http://web.lexis-nexis.com/>.

Hulnick, Arthur S. Keeping us Safe: Secret Intelligence and Homeland Security. N.p.:

Greenwood Publishing Group, 2004.

Johnson, Jeremy, and Alex Lefebvre. "US: Impact of Northeast blackout continues to

emerge." World Socialist Website. 20 Aug. 2003. International Committee of

the Fourth International. 2 July 2008

<http://www.wsws.org/articles/2003/aug2003/blck-a20.shtml>.

Kjos, Berit. “Homeland Security and the Transformation of America.” Kjos Ministries

(Feb. 2003). 4 Feb. 2008 <http://www.crossroad.to///.htm>.

Larson, Eric V, and John E Peters. Preparing the US Army for Homeland Security:

Concepts, Issues and Options. N.p.: Rand Corporation, 2001.

Lewis, Ted G. Critical Infrastructure Protection in Homeland Security. N.p.: Wiley-

Interscience, 2006.

LODER, ASJYLYN. "Utilities are still in dark over Florida blackout." St. Petersburg

Times 28
Cyber Security Page 32 of 35

Feb.2008. 2 July 2008

<http://www.sptimes.com/2008/02/28/Business/Utilities_are_still_i.shtml>.

Nakashima, Ellen, and Steven Mufson. "Hackers Have Attacked Foreign Utilities, CIA

Analyst Says." The Washington Post 19 Jan. 2008. 3 July 2008

http://www.washingtonpost.com/wp-dyn/

content/article/2008/01/18/AR2008011803277.html>.

"networks." The American Heritage® Dictionary of the English Language, Fourth

Edition. Houghton Mifflin Company, 2004. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/networks>.

"networks." The American Heritage® Science Dictionary. Houghton Mifflin Company.

13 Jul. 2008. <Dictionary.com http://dictionary.reference.com/browse/networks>.

“Organization for Homeland Security: Issues and Options.” Terrorism Project . 21 Dec.

2001. Center for Defense Information. 4 Feb. 2008 <http://www.cdi.org//

homelandsecurity.cfm>.

Picanso, Kathryn. "PROTECTING INFORMATION SECURITY UNDER A UNIFORM

DATA BREACH NOTIFICATION LAW." Fordham Law Review 75.355

(Oct. 2006). 2 July 2008 <http://www.lexis.com>.

"protection." Dictionary.com Unabridged (v 1.1). Random House, Inc. 13 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/protection>.

"protection." The American Heritage® Dictionary of the English Language, Fourth

Edition. Houghton Mifflin Company, 2004. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/protection>.

"protection." WordNet® 3.0. Princeton University. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/protection>.
Cyber Security Page 33 of 35

"protection." Webster's Revised Unabridged Dictionary. MICRA, Inc. 13 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/protection>.

Reese, Shawn. “Homeland Security Advisory System: Possible Issues for Congressional

Oversight.” CRS Report for Congress. 11 Jan. 2005. Congressional Research

Service. 4 Feb. 2008 <http://fas.org///.pdf>.

Scardaville, Michael, and Jack Spencer. Federal Homeland Security Policy: A Nine-

Month Assessment. 25 June 2002. Heritage Foundation. 4 Feb. 2008

<http://www.heritage.org///.cfm>.

Spadanuta, Laura. “The Privacy Problem: Homeland Security Failures.” News21 Liberty

vs Security, Privacy in an Age of Security. 1 Sept. 2006. A Journalism Initiative

of the Carnegie and Knight Foundations. 4 Feb. 2008 <http://newsinitiative.org///

//_privacy_problem_homeland_security>.

Spencer, Hsu, and William Branigin. “New Security Strategy Emphasizes disaster

Preparedness.” Washington Post 10 Oct. 2007: a02. LexisNexis Academic.

LexisNexis. 4 Feb. 2008 <http://web.lexis-nexis.com/>.

"strengthen." Dictionary.com Unabridged (v 1.1). Random House, Inc. 13 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/strengthen>.

"strengthen." The American Heritage® Dictionary of the English Language, Fourth

Edition. Houghton Mifflin Company, 2004. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/strengthen>.

"strengthen." WordNet® 3.0. Princeton University. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/strengthen>.
Cyber Security Page 34 of 35

"supporting." The American Heritage® Dictionary of the English Language, Fourth

Edition. Houghton Mifflin Company, 2004. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/supporting>.

"supporting." WordNet® 3.0. Princeton University. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/supporting>.

Tay, Liz. "Cyber security author discusses economics of protecting cyberspace." IT News

(May 2008). 4 July 2008 <http://www.itnews.com.au/Feature/ 4551,cyber-

security-author-discusses-economics-of-protecting-cyberspace.aspx>.

“Terrorism, Counter-Terrorism, Homeland Security.” Project on Defense Alternatives. 19

Nov. 2007. The Commonwealth Institute. 4 Feb. 2008 <http://www.comw.org//>.

"transportation." Dictionary.com Unabridged (v 1.1). Random House, Inc. 13 Jul. 2008.

<Dictionary.com http://dictionary.reference.com/browse/transportation>.

"transportation." The American Heritage® Dictionary of the English Language, Fourth

Edition. Houghton Mifflin Company, 2004. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/transportation>.

"transportation." WordNet® 3.0. Princeton University. 13 Jul. 2008. <Dictionary.com

http://dictionary.reference.com/browse/transportation>.

Ulman, Harlan. “Rethinking homeland security II: Why government isn’t working.”

Washington Times 31 May 2006: a19. LexisNexis Academic. LexisNexis. 4 Feb.

2008 <http://web.lexis-nexis.com/>.

United States. Department of Homeland Security. Banking and Finance: Critical

Infrastructure and Key Resources Sector-Specific Plan as input to the National


Cyber Security Page 35 of 35

Infrastructure Protection Plan. Department of the Treasury, May 2007. 3 July

2008 <http://www.dhs.gov/xlibrary/assets/ Banking_SSP_5_21_07.pdf>.

United States. Department of Homeland Security. A National Strategy to Secure

Cyberspace. The White House, February 2003. 2 July 2008

<http://www.whitehouse.gov/pcipb/cyberspace_strategy.pdf>.

Update on Homeland Security Issues. 25 Nov. 2002. Government Affairs Program,

american Geological Institute. 4 Feb. 2008 <http://www.agiweb.org///.html>.

"War Games." Internet Movie Database. 2008. 10 July 2008

<http://www.imdb.com/title/tt0086567/ plotsummary >.

Woellert, Lorraine. “Hesistation at Homeland Security: A high-tech missile defense for

passenger jets now exits, but plans to install it don’t.” Business Week 27 Mar.

2006: 36. LexisNexis Academic. LexisNexis. 4 Feb. 2008 <http://web.lexis-

nexis.com/>.

You might also like