SECURITY IN CYBERSPACE
STAFF STATEMENT
U.S. SENATE
PERMANENT SUBCOMMITTEE ON INVESTIGATIONS
(Minority Staff)
HEARINGS
ON
JUNE 5, 1996
Summary
TABLE OF CONTENTS
A. Defining the National Information Infrastructure 3
B. Our Dependency on the NII 4
A. Weaknesses in Hardware & Software 11
B. Human Factor 16
C. Lack of Security Culture 18
D. Examples of Vulnerabilities 21
A. Lack of Intelligence Collection 26
B. Lack of Detection and Reporting 32
1. Government 32
2. Private Sector 33
C. The Potential Attackers 38
A. Creation of a National Policy 43
B. Current Law Enforcement Response 45
C. Private Sector Response 48
D. Computer Emergency Response Team (CERT) 50
E. Encryption and the NII 53
F. NIST and NSTAC 55
1. National Institute of Standards and Technology (NIST) 55
2. National Security Telecommunications Advisory Committee (NSTAC) . 56
G. International Efforts to Promote Information Security 57
APPENDIX 64