Cybersecurity

Primary Sources

U.S. Department of Homeland Security: Ethical Principles Guiding Information and Communication Technology Research (Menlo Report)

Published in December 2011 and amended in August 2012, the Department of Homeland Security proposed a framework for ethical guidelines for computer and information security research. The framework was informed by the three principles of the 1979 Belmont Report for ethical research in the biomedical and behavioral sciences, Respect for Persons, Beneficence, and Justice. The Menlo Report adds the principle Respect for Law and Public Interest.

See more in United States; Internet Policy; Cybersecurity

Must Read

WashPost: Understanding Cyberspace is Key to Defending Against Digital Attacks

Author: Robert O'Harrow Jr.

Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe, writes Robert O'Harrow Jr. at the Washington Post. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace.

See more in United States; Cybersecurity

Primary Sources

Cybersecurity Act of 2012 (Proposed)

The Cybersecurity Act of 2012 (S. 2105) was introduced by Senator Joseph Lieberman in the U.S. Senate on February 14, 2012.

The summary states, "Directs the Secretary of Homeland Security (DHS), in consultation with owners and operators of critical infrastructure, the Critical Infrastructure Partnership Advisory Council, and other federal agencies and private sector entities, to: (1) to conduct a top-level assessment of cybersecurity risks to determine which sectors face the greatest immediate risk, and beginning with the sectors identified as having the highest priority, conduct, on a sector-by-sector basis, cyber risk assessments of the critical infrastructure; (2) establish a procedure for the designation of critical infrastructure; (3) identify or develop risk-based cybersecurity performance requirements; and (4) implement cyber response and restoration plans. Sets forth requirements for securing critical infrastructure, including notification of cyber risks and threats and reporting of significant cyber incidents affecting critical infrastructure."

See more in Cybersecurity; United States

Foreign Affairs Article

Chinese Computer Games

Author: Adam Segal

In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers.

See more in China; Cybersecurity

Analysis Brief

Securing U.S. Cyberspace

Author: Jonathan Masters

Most critical information systems in the United States are operated by the private sector and remain vulnerable to cyber attacks. Newly proposed legislation would require businesses to meet minimum standards of protection, but has raised concerns about regulatory overreach.

See more in Cybersecurity; United States

Must Read

CRS: Federal Laws Relating to Cybersecurity

Author: Eric A. Fischer

The Congressional Research Service reports that for more than a decade, various experts have expressed increasing concerns about cybersecurity in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised.

See more in United States; Cybersecurity