Date post: | 30-May-2018 |
Category: |
Documents |
Upload: | ar-bharchoondi |
View: | 219 times |
Download: | 0 times |
of 96
8/9/2019 Securing Cyberspace for the 44th Presidency
1/96
Securing Cyberspacefor the 44
thPresidency
A Report of theCSIS Commission on Cybersecurity for the 44th Presidency
Cochairs:Representative James R. LangevinRepresentative Michael T. McCaulScott CharneyLt. General Harry Raduege, USAF (Ret)
Project Director:James A. Lewis
Center for Strategic and International StudiesWashington, DCDecember 2008
8/9/2019 Securing Cyberspace for the 44th Presidency
2/96
About CSIS
In an era of ever-changing global opportunities and challenges, the
Center for Strategic and International Studies (CSIS) provides
strategic insights and practical policy solutions to decisionmakers.CSIS conducts research and analysis and develops policy
initiatives that look into the future and anticipate change.
Founded by David M. Abshire and Admiral Arleigh Burke at
the height of the Cold War, CSIS was dedicated to the simple but
urgent goal of finding ways for America to survive as a nation and
prosper as a people. Since 1962, CSIS has grown to become one of
the worlds preeminent public policy institutions.
Today, CSIS is a bipartisan, nonprofit organization
headquartered in Washington, D.C. More than 220 full-time staff
and a large network of affiliated scholars focus their expertise on
defense and security; on the worlds regions and the unique
challenges inherent to them; and on the issues that know no
boundary in an increasingly connected world.
Former U.S. senator Sam Nunn became chairman of the CSIS
Board of Trustees in 1999, and John J. Hamre has led CSIS as its
president and chief executive officer since 2000.
CSIS does not take specific policy positions; accordingly, all
views expressed herein should be understood to be solely those of
the authors.
2008 by Center for Strategic and International Studies,
Washington, D.C.
All rights reserved.
1800 K Street, NW
Washington, D.C. 20006
202/775-3175
8/9/2019 Securing Cyberspace for the 44th Presidency
3/96
3
Contents
Preface
Executive Summary 1
Summary of Recommendations 5
Introduction The Hidden Battle 11
1 Create a Comprehensive National Security Strategy
for Cyberspace 17
2 Organizing for Cybersecurity 33
3 Rebuilding Partnership with the Private Sector 43
4 Regulate for Cybersecurity 49
5 Identity Management for Cybersecurity 61
6 Modernize Authorities 67
7 Build for the Future 71
Conclusion Winning the Hidden Battle 77
Appendix A Commission Members 79
Appendix B Expert Advisors to the Working Groups 84
Appendix C List of Briefings 85
Appendix D List of Acronyms 89
8/9/2019 Securing Cyberspace for the 44th Presidency
4/96
8/9/2019 Securing Cyberspace for the 44th Presidency
5/96
8/9/2019 Securing Cyberspace for the 44th Presidency
6/96
8/9/2019 Securing Cyberspace for the 44th Presidency
7/96
1
8/9/2019 Securing Cyberspace for the 44th Presidency
8/96
2
8/9/2019 Securing Cyberspace for the 44th Presidency
9/96
3
8/9/2019 Securing Cyberspace for the 44th Presidency
10/96
8/9/2019 Securing Cyberspace for the 44th Presidency
11/96
5
8/9/2019 Securing Cyberspace for the 44th Presidency
12/96
6
8/9/2019 Securing Cyberspace for the 44th Presidency
13/96
7
8/9/2019 Securing Cyberspace for the 44th Presidency
14/96
8
8/9/2019 Securing Cyberspace for the 44th Presidency
15/96
9
8/9/2019 Securing Cyberspace for the 44th Presidency
16/96
8/9/2019 Securing Cyberspace for the 44th Presidency
17/96
11
8/9/2019 Securing Cyberspace for the 44th Presidency
18/96
12
8/9/2019 Securing Cyberspace for the 44th Presidency
19/96
13
8/9/2019 Securing Cyberspace for the 44th Presidency
20/96
14
8/9/2019 Securing Cyberspace for the 44th Presidency
21/96
15
8/9/2019 Securing Cyberspace for the 44th Presidency
22/96
8/9/2019 Securing Cyberspace for the 44th Presidency
23/96
17
8/9/2019 Securing Cyberspace for the 44th Presidency
24/96
18
8/9/2019 Securing Cyberspace for the 44th Presidency
25/96
19
8/9/2019 Securing Cyberspace for the 44th Presidency
26/96
20
8/9/2019 Securing Cyberspace for the 44th Presidency
27/96
21
8/9/2019 Securing Cyberspace for the 44th Presidency
28/96
22
8/9/2019 Securing Cyberspace for the 44th Presidency
29/96
23
8/9/2019 Securing Cyberspace for the 44th Presidency
30/96
24
8/9/2019 Securing Cyberspace for the 44th Presidency
31/96
25
8/9/2019 Securing Cyberspace for the 44th Presidency
32/96
26
8/9/2019 Securing Cyberspace for the 44th Presidency
33/96
27
8/9/2019 Securing Cyberspace for the 44th Presidency
34/96
28
8/9/2019 Securing Cyberspace for the 44th Presidency
35/96
29
8/9/2019 Securing Cyberspace for the 44th Presidency
36/96
30
8/9/2019 Securing Cyberspace for the 44th Presidency
37/96
31
8/9/2019 Securing Cyberspace for the 44th Presidency
38/96
32
8/9/2019 Securing Cyberspace for the 44th Presidency
39/96
33
8/9/2019 Securing Cyberspace for the 44th Presidency
40/96
34
8/9/2019 Securing Cyberspace for the 44th Presidency
41/96
35
8/9/2019 Securing Cyberspace for the 44th Presidency
42/96
36
8/9/2019 Securing Cyberspace for the 44th Presidency
43/96
37
8/9/2019 Securing Cyberspace for the 44th Presidency
44/96
38
8/9/2019 Securing Cyberspace for the 44th Presidency
45/96
39
8/9/2019 Securing Cyberspace for the 44th Presidency
46/96
40
8/9/2019 Securing Cyberspace for the 44th Presidency
47/96
41
8/9/2019 Securing Cyberspace for the 44th Presidency
48/96
42
8/9/2019 Securing Cyberspace for the 44th Presidency
49/96
43
8/9/2019 Securing Cyberspace for the 44th Presidency
50/96
44
8/9/2019 Securing Cyberspace for the 44th Presidency
51/96
8/9/2019 Securing Cyberspace for the 44th Presidency
52/96
46
8/9/2019 Securing Cyberspace for the 44th Presidency
53/96
47
8/9/2019 Securing Cyberspace for the 44th Presidency
54/96
48
8/9/2019 Securing Cyberspace for the 44th Presidency
55/96
49
8/9/2019 Securing Cyberspace for the 44th Presidency
56/96
50
8/9/2019 Securing Cyberspace for the 44th Presidency
57/96
51
8/9/2019 Securing Cyberspace for the 44th Presidency
58/96
52
8/9/2019 Securing Cyberspace for the 44th Presidency
59/96
53
8/9/2019 Securing Cyberspace for the 44th Presidency
60/96
54
8/9/2019 Securing Cyberspace for the 44th Presidency
61/96
55
8/9/2019 Securing Cyberspace for the 44th Presidency
62/96
56
8/9/2019 Securing Cyberspace for the 44th Presidency
63/96
57
8/9/2019 Securing Cyberspace for the 44th Presidency
64/96
58
8/9/2019 Securing Cyberspace for the 44th Presidency
65/96
59
8/9/2019 Securing Cyberspace for the 44th Presidency
66/96
8/9/2019 Securing Cyberspace for the 44th Presidency
67/96
61
8/9/2019 Securing Cyberspace for the 44th Presidency
68/96
62
8/9/2019 Securing Cyberspace for the 44th Presidency
69/96
63
8/9/2019 Securing Cyberspace for the 44th Presidency
70/96
64
8/9/2019 Securing Cyberspace for the 44th Presidency
71/96
65
8/9/2019 Securing Cyberspace for the 44th Presidency
72/96
8/9/2019 Securing Cyberspace for the 44th Presidency
73/96
67
8/9/2019 Securing Cyberspace for the 44th Presidency
74/96
68
8/9/2019 Securing Cyberspace for the 44th Presidency
75/96
69
8/9/2019 Securing Cyberspace for the 44th Presidency
76/96
70
8/9/2019 Securing Cyberspace for the 44th Presidency
77/96
71
8/9/2019 Securing Cyberspace for the 44th Presidency
78/96
72
8/9/2019 Securing Cyberspace for the 44th Presidency
79/96
73
8/9/2019 Securing Cyberspace for the 44th Presidency
80/96
74
8/9/2019 Securing Cyberspace for the 44th Presidency
81/96
75
8/9/2019 Securing Cyberspace for the 44th Presidency
82/96
8/9/2019 Securing Cyberspace for the 44th Presidency
83/96
77
8/9/2019 Securing Cyberspace for the 44th Presidency
84/96
78
8/9/2019 Securing Cyberspace for the 44th Presidency
85/96
79
8/9/2019 Securing Cyberspace for the 44th Presidency
86/96
80
8/9/2019 Securing Cyberspace for the 44th Presidency
87/96
81
Franklin Reeder
Chair, Center for Internet Security
8/9/2019 Securing Cyberspace for the 44th Presidency
88/96
82
8/9/2019 Securing Cyberspace for the 44th Presidency
89/96
83
8/9/2019 Securing Cyberspace for the 44th Presidency
90/96
84
8/9/2019 Securing Cyberspace for the 44th Presidency
91/96
85
8/9/2019 Securing Cyberspace for the 44th Presidency
92/96
86
8/9/2019 Securing Cyberspace for the 44th Presidency
93/96
87
8/9/2019 Securing Cyberspace for the 44th Presidency
94/96
88
8/9/2019 Securing Cyberspace for the 44th Presidency
95/96
89
8/9/2019 Securing Cyberspace for the 44th Presidency
96/96