ABSTRACT

Holistic Approaches to Cybersecurity Enabling Network Centric Operations, U.S. House of Representatives, Committee on Armed Services, Subcommittee on Terrorism, Unconventional Threats And Capabilities, One Hundred Tenth Congress, Second Session, April 1, 2008   [open pdf - 3MB]

From Adam Smith's opening statement: "As our forces move closer to the vision of network-centric operations, it's absolutely crucial that we make proper investments in cybersecurity. Net-centric warfare depends not only on the operation of network connections and infrastructure, but on being able to trust the information being shared across the networks in question. That means we have to not only protect highly vulnerable physical choke-points of global network infrastructure, but also take into account factors such as the potential security vulnerabilities posed by outsourcing of coding functions to overseas contractors, as well as the 'human factor'- weak passwords, vulnerability to social engineering, and the like." Statements, letters, and materials submitted for the record include those of the following: Subcommittee Chairman Adam Smith; Seymour Goodman, Chair, National Research Council Committee on Improving Cybersecurity Research in the U.S.; James Lewis, Director and Senior Fellow, Technology and Public Policy Program at the Center for Strategic and International Studies (CSIS), and Franklin Kramer, Distinguished Research Fellow, Center for Technology and National Security Policy.

Report Number:
H.A.S.C. No. 110-141; House Armed Services Committee No. 110-141
Publisher:
Date:
2009
Copyright:
Public Domain
Retrieved From:
Government Printing Office, Congressional Hearings: http://www.gpoaccess.gov/chearings/index.html
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations