A. Defining the National Information Infrastructure 3
B. Our Dependency on the NII 4
A. Weaknesses in Hardware & Software 11
B. Human Factor 16
C. Lack of Security Culture 18
D. Examples of Vulnerabilities 21
A. Lack of Intelligence Collection 26
B. Lack of Detection and Reporting 32
1. Government 32C. The Potential Attackers 38
2. Private Sector 33
A. Creation of a National Policy 43
B. Current Law Enforcement Response 45
C. Private Sector Response 48
D. Computer Emergency Response Team (CERT) 50
E. Encryption and the NII 53
F. NIST and NSTAC 55
1. National Institute of Standards and Technology (NIST) 55G. International Efforts to Promote Information Security 57
2. National Security Telecommunications Advisory Committee (NSTAC) . 56