Getting It Right: Protecting American Critical Infrastructure in Cyberspace. Getting It Right: Protecting American Critical Infrastructure in Cyberspace.

Getting It Right: Protecting American Critical Infrastructure in Cyberspace‪.‬

Harvard Journal of Law & Technology 2007, Spring, 20, 2

    • £2.99
    • £2.99

Publisher Description

THE DOGMAS OF THE QUIET PAST ARE INADEQUATE TO THE STORMY PRESENT. THE OCCASION IS PILED HIGH WITH DIFFICULTY, AND WE MUST RISE TO THE OCCASION. AS OUR CASE IS NEW, SO WE MUST THINK ANEW AND ACT ANEW. (1) WHERE ONCE OUR OPPONENTS RELIED EXCLUSIVELY ON BOMBS AND BULLETS, HOSTILE POWERS AND TERRORISTS CAN NOW TURN A LAPTOP COMPUTER INTO A POTENT WEAPON CAPABLE OF DOING ENORMOUS DAMAGE. IF WE ARE TO CONTINUE TO ENJOY THE BENEFITS OF THE INFORMATION AGE, PRESERVE OUR SECURITY, AND SAFEGUARD OUR ECONOMIC WELL-BEING, WE MUST PROTECT OUR CRITICAL COMPUTER-CONTROLLED SYSTEMS FROM ATTACK. (2)

GENRE
Professional & Technical
RELEASED
2007
22 March
LANGUAGE
EN
English
LENGTH
36
Pages
PUBLISHER
Harvard Law School, Harvard Journal of Law & Technology
SIZE
219.4
KB

More Books Like This

The Virtual Weapon and International Order The Virtual Weapon and International Order
2017
Conflicts, Crimes and Regulations in Cyberspace Conflicts, Crimes and Regulations in Cyberspace
2021
Essential Guide to Air Force Cyberspace: 50 Cyber Questions Every Airman Can Answer, Airpower Lessons for an Air Force Cyber-Power Targeting Theory, Conceptualizing Cyber Intelligence, ISR, USCYBERCOM Essential Guide to Air Force Cyberspace: 50 Cyber Questions Every Airman Can Answer, Airpower Lessons for an Air Force Cyber-Power Targeting Theory, Conceptualizing Cyber Intelligence, ISR, USCYBERCOM
2019
Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example
2016
Information Warfare Information Warfare
2012
Addressing Cyber Instability Addressing Cyber Instability
2013

More Books by Harvard Journal of Law & Technology

Embryonic Stem Cell Research and the Theory of Medical Self-Defense. Embryonic Stem Cell Research and the Theory of Medical Self-Defense.
2008
The Wealth of Networks: How Social Production Transforms Markets and Freedom (Book Review) The Wealth of Networks: How Social Production Transforms Markets and Freedom (Book Review)
2006
Stream Capture: Returning Control of Digital Music to the Users. Stream Capture: Returning Control of Digital Music to the Users.
2011
Recasting Privacy Torts in a Spaceless World. Recasting Privacy Torts in a Spaceless World.
2007
All in the Family: Privacy and DNA Familial Searching. All in the Family: Privacy and DNA Familial Searching.
2010
Assigning Rights and Protecting Interests: Constructing Ethical and Efficient Legal Rights in Human Tissue Research. Assigning Rights and Protecting Interests: Constructing Ethical and Efficient Legal Rights in Human Tissue Research.
2009