Bombs and Bandwidth: The Emerging Relationship Between by Robert Latham

By Robert Latham

A multidisciplinary view of knowledge know-how because it is utilized by governments and legal businesses alike.

Why purchase a multi-billion-dollar satellite tv for pc and visit severe lengths to aim to prevent governmental detection if you happen to can simply purchase a little airtime and ship among the many million messages going out at any given time?—from Bombs and Bandwidth

Information know-how (IT) has turn into important to the way in which governments, companies, social events or even terrorist and legal organisations pursue their more and more globalized targets. With the emergence of the net and new electronic applied sciences, conventional limitations are more and more inappropriate, and standard concepts—from privateness to surveillance, vulnerability, and mainly, security—need to be reconsidered. within the post-9/11 period of "homeland security," the connection among IT and safeguard has received a brand new and urgent relevance. Bombs and Bandwidth, a venture of the Social technological know-how study Council, assembles prime students in various disciplines to discover the hot nature of IT-related threats, the recent strength constructions rising round IT, and the moral and political implications bobbing up from this complicated and demanding box.

Contributors contain: Ralf Bendrath, Michael Dartnell, Robert J. Deibert, Dorothy Denning, Chris Hables grey, Rose Kadende-Kaiser, Susan Landau, Robert Latham, Timothy Lenoir, Martin Libicki, Carolyn Nordstrom, Rafal Rohozinski, Marc Rotenberg, Janice Gross Stein, Rachel Yould.

Show description

Read or Download Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security PDF

Similar comptia books

The Corporate Security Professional's Handbook on Terrorism

The company safeguard Professional's instruction manual on Terrorism is a qualified reference that clarifies the adaptation among terrorism opposed to companies and their resources, as opposed to terrorism opposed to executive resources. It addresses the present misconceptions relating to how terrorism does or doesn't impact agencies, and offers defense execs and enterprise executives with a greater figuring out of the way terrorism may well effect them.

Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science)

Technological advances have resulted in broad deployment and use of embedded structures in an expanding diversity of functions, from cell phones to automobile, airplane and spacecraft and from electronic ids to army structures within the box. lots of those functions position major safety standards and feature ended in major learn job within the zone of safety and embedded platforms, a result of constrained assets of traditional embedded syst+S37ems.

Advances in Enterprise Information Technology Security (Premier Reference)

Advances in firm info expertise safety offers a vast operating wisdom of all of the significant safeguard concerns affecting todays firm IT actions. The chapters during this finest Reference resource are written through many of the worlds prime researchers and practitioners within the filed of IT defense.

Additional resources for Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security

Example text

One exception is the Health Information Portability Accountability Act (HIPAA), which specifies security and privacy requirements for systems that handle patient records. However, many private-sector organizations choose to impose internal security policies on their IT operations. A fourth set of laws and regulations restricts trade in information security technologies. For example, certain encryption technologies are subject to export controls, although these controls have been substantially lifted in recent years.

Limitations of space preclude giving more than a broad overview of the topics here. Many issues are ignored or brushed over lightly. Further, more attention is paid to developments in the United States than elsewhere. The aim of this chapter is a conceptual framework for understanding the state of security today rather than complete coverage of all the pieces of the framework. DOROTHY E. DENNING • 27 THE CYBER-SECURITY INFRASTRUCTURE The cyber-security infrastructure consists of those elements involved in the protection of networked computers and information from cyber-threats.

PEOPLE AND ORGANIZATIONS The security infrastructure includes individuals and organizations with an interest in security. Both formal and informal organizations participate, including government agencies, corporations, educational institutions, professional societies, nonprofit organizations, research communities, standards committees, international bodies, and consortia. Some groups come together temporarily for a specific purpose, for example, to participate in a security-related seminar, workshop, or meeting.

Download PDF sample

Rated 4.27 of 5 – based on 28 votes