Navigating the Perils of the Next Information Age
RICHARD M. HARRISON AND TREY HERR
"Cyber Insecurity deserves to be read by policymakers, industry leaders, academics, and anyone concerned with these increasingly central issues."
-- Nate Fick, CEO of Endgame Inc., and NYT bestselling author of One Bullet Away
"A real primer for anyone wanting to better understand the emerging age."
-- Gen. Michael V. Hayden, Former Director of the NSA and CIA
HOW CAN WE MITIGATE CYBER THREATS?
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Accounting for these new challenges presents a series of thorny public policy problems. In this volume, academics, practitioners, and former service members come together to highlight sixteen of the most pressing contemporary challenges and to offer recommendations for the future. They provide insight for the debate over cybersecurity policy and offer readers a tempered sense of the fragility embedded in our core technologies. The book provides background and recommendations to help mitigate the threats of tomorrow while serving to inform the policies being shaped today.
"Cyber Insecurity identifies the risks and threats to the system upon which we become more dependent every day and the means to overcome them." -- Tom Ridge, First Secretary of the Department of Homeland Security
ABOUT THE BOOK
Computing is built on an architecture of trust. All of us who use computers trust that we will be able to distinguish data from instructions, and content which is malicious from that which is benign. That foundation dates back to the creation of the internet itself; the earliest users of the world-wide web were members of an academic network who trusted one another because they were also part of many of the same extended social networks.
Accordingly, the architecture of cybersecurity is built around technical and policy mechanisms that are designed to create trust in people’s identity, the integrity of our systems, and the secrecy of our data. But while trust is key, it is only equal in importance to what we know. How we understand cybersecurity, categorize it, debate it, and learn about it influences our awareness of shared challenges and practical opportunities. For the policy community, what we know may actually be more important than trust because that understanding shapes the formation of our laws, rules, and regulations.