Worm and virus defense: how can we protect the nation's computers from these threats? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 10, 2003

Voorkant

Vanuit het boek

Geselecteerde pagina's

Overige edities - Alles bekijken

Veelvoorkomende woorden en zinsdelen

Populaire passages

Pagina 52 - BEFORE THE COMMITTEE ON GOVERNMENT REFORM SUBCOMMITTEE ON TECHNOLOGY, INFORMATION POLICY, INTERGOVERNMENTAL RELATIONS, AND THE CENSUS US HOUSE OF REPRESENTATIVES September 10, 2003 Good morning, Mr.
Pagina 143 - Deputy Chief of the Computer Crime and Intellectual Property Section of the Criminal Division of the Department of Justice, the...
Pagina 35 - ... the National Institute of Standards and Technology, the National Security Agency, and other agencies. What is often missing today is management commitment: senior management's visible endorsement of security improvement efforts and the provision of the resources needed to implement the required improvements. Expanded research in information assurance: It is critical to maintain a long-term view and invest in research toward systems and operational techniques that yield networks capable of surviving...
Pagina 36 - Vendors need to be proactive, and adopt known, effective software engineering practices that dramatically reduce the number of flaws in software products. • High-security default configurations — With the complexity of today's products, properly configuring systems and networks to use the strongest security built into the products is difficult, even for people with strong technical skills and training. Small mistakes can leave systems vulnerable and put users at risk. Vendors can help reduce...
Pagina 63 - ... knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer...
Pagina 35 - With increased complexity comes the introduction of more vulnerabilities, so solutions do not solve problems for the long term system maintenance is never-ending. Because managers do not fully understand the risks, they neither give security a high enough priority nor assign adequate resources. Exacerbating the problem is the fact that the demand for skilled system administrators far exceeds the supply. • As we face the complex and rapidly changing world of the Internet, comprehensive solutions...
Pagina 38 - safer-cyberspace" will require, the NCSD and the entire Federal government to work with state and local governments and the private sector to drive better software practices, higher awareness at all levels, increased research and development activities, and increased training for technical specialists. CONCLUSION Our dependence on interconnected computing systems is rapidly increasing, and even short-term disruptions from viruses and worms can have major consequences. Our current solutions are not...
Pagina 12 - Worm: an independent computer program that reproduces by copying itself from one system to another across a network. Unlike computer viruses, worms do not require human involvement to propagate.

Bibliografische gegevens