Bombs and Bandwidth: The Emerging Relationship Between by Robert Latham

By Robert Latham

A multidisciplinary view of data know-how because it is utilized by governments and legal companies alike.

Why purchase a multi-billion-dollar satellite tv for pc and visit severe lengths to aim to prevent governmental detection should you can simply purchase slightly airtime and ship one of the million messages going out at any given time?—from Bombs and Bandwidth

Information know-how (IT) has develop into significant to the best way governments, companies, social activities or even terrorist and legal businesses pursue their more and more globalized ambitions. With the emergence of the web and new electronic applied sciences, conventional limitations are more and more beside the point, and conventional concepts—from privateness to surveillance, vulnerability, and exceptionally, security—need to be reconsidered. within the post-9/11 period of "homeland security," the connection among IT and protection has got a brand new and urgent relevance. Bombs and Bandwidth, a undertaking of the Social technological know-how study Council, assembles top students in a variety of disciplines to discover the hot nature of IT-related threats, the recent energy buildings rising round IT, and the moral and political implications bobbing up from this advanced and demanding box.

Contributors contain: Ralf Bendrath, Michael Dartnell, Robert J. Deibert, Dorothy Denning, Chris Hables grey, Rose Kadende-Kaiser, Susan Landau, Robert Latham, Timothy Lenoir, Martin Libicki, Carolyn Nordstrom, Rafal Rohozinski, Marc Rotenberg, Janice Gross Stein, Rachel Yould.

Show description

Read or Download Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security PDF

Best comptia books

Privacy Protection and Computer Forensics(Artech House Computer Security Series)

This revised variation of an Artech apartment bestseller is going a long way past the common machine forensics books out there, emphasizing tips on how to guard one's privateness from info robbery and adversarial computing device forensics. the second one variation has been up to date to supply extra precise how-to counsel on holding the confidentiality of knowledge saved on desktops, and particular info at the vulnerabilities of general ancillary computing units, reminiscent of PDAs, mobile phones, shrewdpermanent playing cards, GPS units, mobile calling playing cards, fax machines, and photocopiers.

Security in RFID and Sensor Networks

Long ago a number of years, there was an expanding development within the use of Radio Frequency id (RFID) and instant Sensor Networks (WSNs) in addition to within the integration of either structures because of their complementary nature, versatile mixture, and the call for for ubiquitous computing. As continuously, sufficient defense is still one of many open parts of shock sooner than extensive deployment of RFID and WSNs will be completed.

Foundations of Security Analysis and Design II

Defense is a quickly turning out to be sector of desktop technology, with direct and extending relevance to real-life functions, equivalent to web transactions, e-commerce, details safety, community and platforms safeguard, and so forth. Foundations for the research and layout of security measures of such functions are badly wanted on the way to validate and turn out their correctness.

Network Security Policies and Procedures (Advances in Information Security)

Corporation community directors are forced at the present time to aggressively pursue a powerful community safeguard regime. This publication goals to offer the reader a robust, multi-disciplinary figuring out of the way to pursue this objective. This expert quantity introduces the technical matters surrounding safety in addition to how safety guidelines are formulated on the government point and communicated through the association.

Additional info for Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security

Sample text

Whether any of these numbers is accurate or not matters less for security than that they are being used to justify the expenditure of more resources to solve security problems. Ideally, security would be free, fast, and foolproof. In practice, it is never all three, and companies need to make hard choices about how much to spend and what to spend it on. In determining security expenditures, a reasonable goal is a positive return on investment (ROI): spend x dollars on security and save at least x in losses from attacks.

Such activity is covered at the federal level by the Computer Fraud and Abuse Act of 1986 and subsequent amendments, and by various other federal and state laws. However, not all countries criminalize these activities, and those that do may not have consistent laws. A second set of laws and regulations governs the investigation of cyber- DOROTHY E. DENNING • 29 attacks and threats by law-enforcement and intelligence officers. These include laws that govern how such agencies are allowed to go about acquiring data about a subject of investigation from third parties, intercepting a subject's communications, and searching and seizing a subject's computing devices.

The Consumer Broadband and Digital Television Promotion Act received considerable support from Hollywood, which seeks technology to protect their intellectual property from distribution on the Internet in violation of copyrights. The IT industry, however, generally opposes any government regulation, as it denies them certain business opportunities. Governments have influenced the security market by issuing criteria for assessing the security offered by a product. S. Department of Defense Trusted Computer System Evaluation Criteria (the"Orange Book") and more recent international Common Criteria, for example, have led to products that meet specified security objectives and an industry segment concerned with product evaluations.

Download PDF sample

Rated 4.85 of 5 – based on 19 votes