Defending against cyber-attack
Related Articles
- Government plans national strategy to fight cybercrime. Goodwin, Bill // Computer Weekly;5/23/2002, p6
Reports on the plans of the government to create a national information security strategy to fight computer crimes in Great Britain. Coordination of the government bodies and private sector for the projects; Response to the concerns about threat posed by computer criminals; Identification of...
- Advancing Protections Against Cyber Threats. Owens, David K. // Power Engineering;Jul2011, Vol. 115 Issue 7, p10
The article discusses the development of newer systems to better manage energy usage in the U.S., and the need to protect it against cyber attacks. It cites various systems such as the Envision: Charlotte, a collaboration between the North Carolinian city and private industries, to better...
- Industry's Vital Role in National Cyber Security. Farwell, James P. // Strategic Studies Quarterly;Winter2012, Vol. 6 Issue 4, p10
The article discusses the importance of cooperation between the government and the private sector to effectively develop cyber security measures in the U.S. It highlights the view of several public officials regarding the growth of cyber threats in the military and commercial sector, and their...
- A Relationship on the Rocks: Industry-Government Partnership for Cyber Defense. Clinton, Larry // Journal of Strategic Security;May2011, Vol. 4 Issue 2, p97
Cyber security is a complex issue that requires a smart, balanced approach to public-private partnership. However, there is not a simple gold standard or mandatory minimum standard of cyber security, which can cause friction in the relationship between government and private industry. There are...
- Good cyber security requires collaboration. // American City & County;Jul2008, Vol. 123 Issue 7, p19
The article focuses on the 2008 Critical Connections study released by Symantec and Dell Computers which emphasizes the need for the public and private sectors to collaborate on the issue of cyber security. The study covers respondents' awareness of and attitude toward the proposed National...
- MEETING DATES. // Modern Machine Shop;May2014, Vol. 86 Issue 12, p57
The article offers information on several meetings and expositions to be held in the U.S. from May to June 2014 including the ninth annual National Center for Defense Manufacturing and Machining (NCDMM) Summit in Blairsville, Pennsylvania from May 7-8, The Big M exposition and conference in...
- 30 seconds on…. // SC Magazine: For IT Security Professionals (15476693);Jun2012, Vol. 23 Issue 6, p16
The article offers information related to information technology (IT) security management, including the cyber security bill allowing the exchange of information related to security between private sector and the federal government, the Cyber Intelligence Sharing and Protection Act of 2011...
- AmeriÄko javno-privatno partnerstvo i cyber sigurnost. KOVAČEVIĆ, BOŽO // Politicka Misao: Croatian Political Science Review;2014, Vol. 51 Issue 3, p76
ICT industry has decisive impact on the articulation of American national interests in cyberspace. The private sector presents itself as a guardian of privacy rights against criminal intrusions and possible government's misuse. But in reality certain initiatives for closer cooperation between...
- Government's Trusted Communications and IT Solutions Firm Focuses on Details of Tech Management. // San Diego Business Journal;7/31/2006, Vol. 27 Issue 31, pA28
The article reports on the services and products offered by Fairfax, Virginia-based Nortel Government Solutions Inc. When Nortel acquired PEC Solutions Inc. in June 2005, it integrated one of the most respected government solutions providers with one of the recognized leadership in global...