Addressing the Cyber Threat: A Policy Perspective

Posted April 30, 2011 | |

We face many challenges when designing, developing, using, and supporting the computers and software collectively called the "cyber infrastructure." This vast system is the backbone on which more and more of our commerce and communication are based, so we protect it by plugging the cyber security "holes" caused by built-in vulnerabilities. In doing so, we deal with unwelcome outages and changes, the consequences of which can range from temporary annoyance to long-term destruction of property or way of life.

About The Author
Shari Pfleeger
Shari Lawrence Pfleeger is Director of Research for the Institute for Information Infrastructure Protection (I3P), a consortium of 27 US universities, national laboratories, and nonprofit research institutions examining critical problems in cyber security, dependability, safety, and reliability. Dr. Pfleeger's work examines how technology supports business and government goals. Her many articles and books include Security in Computing (with… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.