TITLE

A LONG AND WINDING ROAD FOR CYBERSECURITY COOPERATION BETWEEN JAPAN AND THE UNITED STATES

AUTHOR(S)
Matsubara, Mihoko
PUB. DATE
March 2012
SOURCE
Harvard Asia Quarterly;Spring/Summer2012, Vol. 14 Issue 1/2, p103
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Tokyo and Washington publicly announced their cooperation on cybersecurity for the first time in June 2011. As two of the most economically and politically powerful actors in the world, both Japan and the United States have more to lose than most other countries in the face of cyber threats and are thus obliged to reduce their vulnerabilities in order to prevent negative consequences for the international community. hey need to cover cyberspace in the Security Treaty and establish the rules of engagement in the domain. In the short run, timely information-sharing is key to responding to cyber-attacks and espionage and preventing further damage. Furthermore, Tokyo needs to reconsider the Self-Defense Forces' offensive cyber capabilities, revise the SDF Law to cover cyber domain as a new area of responsibility, and strengthen information security and assurances. Such measures would truly contribute to cybersecurity cooperation and a stronger alliance.
ACCESSION #
79366257

 

Related Articles

  • ACROSS THE BOARD. Armstrong, Illena // SC Magazine: For IT Security Professionals (15476693);Apr2010, Vol. 21 Issue 4, p32 

    The article discusses the highlights of a financial services roundtable held in New York, wherein security experts discussed how they can improve and refine information technology (IT) security tactics. Mark Sokol, a member of the board at the Financial Services Information Sharing and Analysis...

  • WHY information security is everybody's business. Jackson, Donovan // New Zealand Management;Dec2014/Jan2015, Vol. 61 Issue 5, p18 

    The article discusses reasons behind the need for everybody to be involved in information security. Topics discussed include the complexity of information technology (IT) in the 21st century, as well as the evolving nature of cyber risks, the role to be played by the chief executive officer on...

  • Damage to German Factory Shows Danger of ICS Hacks. Lemos, Robert // eWeek;12/26/2014, p1 

    The article focuses on a report published by the German government on a German steel factory that suffered cyber-attack, which caused physical damage to the systems of the plant. It highlights a report from by the German Federal Office for Information Security, which revealed that the attackers...

  • Is U.S. Critical Infrastructure Under Attack? Kerner, Sean Michael // eWeek;12/22/2015, p1 

    The article discusses how Iranian hackers gained access to the U.S. critical infrastructure. Topics discussed include focus of cyber security companies to protect information technology (IT) networks, automation to reduce the risk of cyber attack in critical infrastructures, stealing of data...

  • What good cyber resilience looks like. Hult, Fredrik; Sivanesan, Giri // Journal of Business Continuity & Emergency Planning;Winter2013/2014, Vol. 7 Issue 2, p112 

    Over the past few years, a rapidly increasing number of sophisticated cyber attacks targeting high-profile organisations have been reported in the media. With the growing realisation of the severity and scale of the cyber threat, many security leaders are now questioning the effectiveness of...

  • NETWORK PROACTIVE DEFENSE MODEL BASED ON IMMUNE DANGER THEORY. Yu WANG; Zhenxing WANG; Liancheng ZHANG; Yazhou KONG // Computing & Informatics;2015, Vol. 34 Issue 5, p1089 

    Recent investigations into proactive network defense have not produced a systematic methodology and structure; in addition, issues including multi-source information fusion and attacking behavior analysis have not been resolved. Borrowing ideas of danger sensing and immune response from danger...

  • SECURITY STARTS AT HOME.  // eWeek;06/19/2000, Vol. 17 Issue 25, p60 

    Editorial. Comments on security vulnerabilities inherent in information technology (IT) and the need for IT managers to take responsibility for the security of their companies' IT architectures. Mistake of placing all of the blame on Microsoft; Observation that many IT managers still deploy...

  • Elements of a Comprehensive Security Solution. Katz, David // Health Management Technology;Jun2000, Vol. 21 Issue 6, p12 

    Discusses the elements of a complete information security solution. Characteristics of an effective system for securing the integrity of information; Strategies that can be used to enhance physical security; Forms of computer network attacks.

  • In Search of a Context-Aware Security...  // Channel Insider;9/21/2015, p4 

    The article offers information on an online video on context-aware information technology (IT) security.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics