Tag Archives: cyberattacks

Take 5: Top 5 Books on Science and Technology

The scientists and engineers on your list may not always be the easiest people to shop for during the holidays. It should come as no surprise that we have recommendations. Take five and finish your holiday shopping with our most-recommended books for the scientifically-minded.

Ensuring the Integrity, Accessibility, and Stewardship of Research Data in the Digital Age Ensuring the Integrity, Accessibility, and Stewardship of Research Data in the Digital Age

As digital technologies are expanding the power and reach of research, they are also raising complex issues. These include complications in ensuring the validity of research data; standards that do not keep pace with the high rate of innovation; restrictions…
Details

Science and Decisions Science and Decisions: Advancing Risk Assessment

Risk assessment has become a dominant public policy tool for making choices, based on limited resources, to protect public health and the environment. It has been instrumental to the mission of the U.S. Environmental Protection Agency (EPA) as well as other…
Details

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations.  Although there is a substantial literature on the potential impact of a cyberattack on the societal…
Details

Rising Above the Gathering Storm Rising Above the Gathering Storm: Energizing and Employing America for a Brighter Economic Future

In a world where advanced knowledge is widespread and low-cost labor is readily available, U.S. advantages in the marketplace and in science and technology have begun to erode. A comprehensive and coordinated federal effort is urgently needed to bolster U.S….
Details

Strengthening Forensic Science in the United States Strengthening Forensic Science in the United States: A Path Forward

Scores of talented and dedicated people serve the forensic science community, performing vitally important work. However, they are often…
Details

Herb Lin Speaks About Cyberattack and Stuxnet

Stuxnet is a quickly mutating computer worm that has been infiltrating computers in Iran. Discovered in June, Stuxnet has been found in over 45,000 computers in various countries, but the vast majority of infected systems are in Iran.

The 2009 title Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities provides insight and a context with which to view the Stuxnet situation. We asked Herb Lin, the Study Director and one of the editors of the book, for his perspective.

“Stuxnet is the first reported incident of malware aimed at computerized industrial control systems that (allegedly) seeks to cause actual damage to these systems, rather than just extracting information from them. That is, it appears to be an instrument of cyberATTACK and not just one of cyberEXPLOITATION. (The difference between cyberattack and cyberexploitation is addressed in the 2009 report on cyberattack.)

The 2009 report also provides the necessary background to understand many aspects of the Stuxnet incident, including the difficulty of attributing the source of a cyberattack, the intelligence support needed for a successful cyberattack to occur, the significance of nation state involvement, and the potential utility of cyberattack as an instrument of clandestine national policy.”

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities is available to download at no charge online at the NAP website. Links to this title and other National Academies reports that may also interest you are listed below.

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations.  Although there is a substantial literature on the potential impact of a cyberattack on the societal…

Details

Proceedings of a Workshop on Deterring CyberAttacks Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy

In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation’s important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity…

Details

Toward Better Usability, Security, and Privacy of Information Technology Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop

Despite many advances, security and privacy often remain too complex for individuals or enterprises to manage effectively or to use conveniently. Security is hard for users, administrators, and developers to understand, making it all too easy to use,…

Details

Toward a Safer and More Secure Cyberspace Toward a Safer and More Secure Cyberspace

Given the growing importance of cyberspace to nearly all aspects of national life, a secure cyberspace is vitally important to the nation, but cyberspace is far from secure today. The United States faces the real risk that adversaries will exploit…

Details

Five new books: Iraq & Afghanistan Vets, Biofuels, Cyberattacks and more

There were five new books on the NAP site this week, touching the topics of military and veterans; transportation and infrastructure; information security and privacy; industry and labor; and energy and energy conservation. Check out all of our topics for more books on all of these topics and more.

Since it’s such a popular feature of our site, I’ll point out that all of this week’s new publications have free PDFs to download. Happy reading!

Featured Publication

Returning Home from Iraq and Afghanistan: Preliminary Assessment of Readjustment Needs of Veterans, Service Members, and Their Families (final)

Nearly 1.9 million U.S. troops have been deployed to Afghanistan and Iraq since October 2001. Many service members and veterans face serious challenges in readjusting to normal life after returning home. This initial book presents findings on the most critical challenges, and lays out the blueprint for the second phase of the study to determine how best to meet the needs of returning troops and their families.

All New Publications This Week

Technologies and Approaches to Reducing the Fuel Consumption of Medium- and Heavy-Duty Vehicles (prepublication)

Letter Report for the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy (final)

The Dragon and the Elephant: Understanding the Development of Innovation Capacity in China and India: Summary of a Conference (final)

Expanding Biofuel Production: Sustainability and the Transition to Advanced Biofuels: Summary of a Workshop (final)