By: John Haley
Table of Contents
1. Introduction
2. Cybersecurity Technology
3. Features of New Technology
4. Role of Federal Government in Development
5. Federal Government: Positive or Negative?
6. Conclusion
References
1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu
2. Greenberg, A. (2013). President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy. Forbes.Com, 32.
3. Hoover, J. N. (2011, November 7). DARPA boosts cybersecurity research spending 50%. Information Week. Retrieved from "http://www.informationweek.com/news/government/security/231902495"
4. Kramer, F., Star, S., & Wentz, L. (2009). Cyberpower and national security. Potomac Books,Inc
5. Nye, J. (2008, December 10). Cyber insecurity. Retrieved from: "http://www.project-syndicate.org/commentary/nye65/English"
6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086-
7. Chan, E., Chaugule, A., Larson, K. and Campbell, R. (2010). Performing Live Forensics on Insider Attacks. CAE Workshop. Illinois University
8. Rogers, E. M., Carayannis, E. G., Kurihara, K., & Allbritton, M. M. (1998). Cooperative Research and Development Agreements (CRADAs) as technology transfer mechanisms. R&D Management, 28(2), 79
9. U.S. Department of Homeland Security (2003). Homeland Security Presidential Directive 7: Critical infrastructure identification, prioritization, and protection. Retrieved from http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm
Introduction
In order to protect our national infrastructure and the vital private information of our citizens from hackers, enemy
References: 1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu 2 3. Hoover, J. N. (2011, November 7). DARPA boosts cybersecurity research spending 50%. Information Week. Retrieved from "http://www.informationweek.com/news/government/security/231902495" 4 5. Nye, J. (2008, December 10). Cyber insecurity. Retrieved from: "http://www.project-syndicate.org/commentary/nye65/English" 6 7. Chan, E., Chaugule, A., Larson, K. and Campbell, R. (2010). Performing Live Forensics on Insider Attacks. CAE Workshop. Illinois University 8 9. U.S. Department of Homeland Security (2003). Homeland Security Presidential Directive 7: Critical infrastructure identification, prioritization, and protection. Retrieved from http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm Introduction