On page 25 of this report, “Data and Statistics” chapter, you will find “data and statistics from government, industry, and IT security firms regarding the current state of cybersecurity threats in the United States and internationally. These include incident estimates, costs, and annual reports on data security breaches, identity theft, cybercrime, malware, and network security.”
Senate Armed Services Committee Hearing; U.S. European Command, U.S. Northern Command, and U.S. Southern Command in review of the Defense Authorization Request for FY2014 and the Future Years Defense Program (20 March 2013)
This publication provides practical guidance to Member States for more effective investigation and prosecution of terrorist cases involving the use of the Internet. Terrorist groups and their supporters use the internet to recruit, finance, spread propaganda, train and incite followers to commit acts of terrorism; as well as to gather and disseminate information for terrorist purposes. The use of the Internet for terrorist purposes disregards national borders, amplifying the potential impact on victims.
"This report was developed by the Cyber Security and Information Assurance Research and Development Senior Steering Group (CSIA R&D SSG) and Cyber Security and Information Assurance Interagency Working Group (CSIA IWG). The CSIA R&D SSG and CSIA IWG report to the Subcommittee on Networking and Information Technology Research and Development (NITRD) of the NSTC’s Committee on Technology. The report is published by the National Coordination Office (NCO) for the NITRD Program."
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.
Alexander KLIMBURG, Heli TIRMAA-KLAAR (April 2011). European Parliament, Directorate-General for External Policies of the Union. (Standard briefing carried out within the framework agreement between TEPSA and the European Parliament. Ref.: EP/EXPO/B/SEDE/FWC/2009-01/Lot6/09)
A generic and global approach on main cybersecurity issues is presented from a strategic perspective in order to give a broad understanding of what kind of concerns should be addressed and what sort of measures should be taken within a national cybersecurity policy. This part also identifies some basic and non-exhaustive needs that should be taken into consideration at national and international levels when dealing with the establishment of a Global Protocol on Cybersecurity and Cybercrime. This document does not aim to focus on specific technical, operational or procedural cybersecurity needs or measures.
The EastWest Institute released the first joint Russian-American report aimed at defining the “rules of the road” for cyber conflict. Prepared by a team of Russian and U.S. experts convened by EWI, Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace explores how to extend the humanitarian principles that govern war to cyberspace.
"The global commons, areas of the world that fall outside national sovereign control including air, sea, space, and cyberspace, is an area of growing concern for the United States and its NATO allies. This paper argues that NATO has a potentially vibrant role to play in helping ensure open and secure access to the global commons. Investments to counter emerging threats, including cyber threats, would fit the defense budget constraints facing many NATO members while simultaneously serving an important strategic purpose. In particular, new NATO cooperation to face cyber challenges from both state and non-state actors can serve a critical role in protecting NATO members from cyber attacks. However, renewed cooperation in the cyber and space com mons will require resolving uncertainty about the relationship between a cyber attack and a kinetic attack, and the conditions for a justifiable cyber retaliation." [FROM THE REPORT]
"On 15 September 2010, the Security and Defence Agenda hosted William J. Lynn, III, US Deputy Secre- tary of Defense, to present the US perspective on cyber- security and discuss NATO’s outlook for improving cyber defence networks." [FROM THE REPORT]
"This paper outlines the arguments for pushing for more rapid progress in U.S.-Russian cooperation on cybersecurity — or, as the Russians prefer to call it, information security. It urges the two sides to make good on their public an- nouncement in December 2009 that they would begin new consultations on cybersecurity in the framework of a United Nations General Assembly resolution. To examine the obstacles and ways to overcome them, the paper discusses four possible areas of cooperation: public key infrastructure; rapid response to cyber crime; deliberation by the Organization for Security and Co-operation in Europe (OSCE) on laws of cyber war; and NATO-Russia cybersecurity cooperation." [FROM REPORT]
The EastWest Institute and the World Federation of Scientists released Rights and Responsibilities in Cyberspace: Balancing the Need for Security and Liberty, which offers three perspectives on the delicate balance between individual rights and the urgency of reaching agreements on new international cyber laws. The publication includes essays by top cybersecurity experts, calling for cooperative dialogue between governments and the private sector around the world to both ensure liberty and protect against the threats of cyber warfare and cyber war.
A report by EWI and the Data Security Council of India lays out several recommendations to begin building the legal, technical and administrative foundations for an international system to secure cyberspace.
United States Government Accountability Office (GAO-10-834T). (16 June 2010). Testimony before Committee on Homeland Security, House of Representatives Statement of Gregory C. Wilshusen, Director Information Security Issues
This publication offers perspectives from China, the U.S., Russia, India and Norway on the prevention of cyber crime, cyber terror and other cyber threats. These issues will be the focus of attention of EWI's first Worldwide Cybersecurity Summit in Dallas from May 3 to 5.
"Cyber security encompasses borderless challenges, while responses remain overwhelmingly national in scope and even these are insufficient. There are enormous gaps in both our understanding of the issue, as well as in the technical and governance capabilities required to confront it. Furthermore, democratic governance concerns – particularly regarding control, oversight and transparency – have been almost entirely absent from the debate. These concerns are exacerbated by the enormous role played by private actors (both alone and in cooperation with governments) in online security of all types. Given the pace at which states and private companies are reinforcing online security and preparing for cyber war, addressing democratic governance concerns has never been more pressing. They are the primary subject of this paper." [FROM THE REPORT]