Department of Defense Authorization for Appropriations for Fiscal Year 2001 and the Future Years Defense Program: Hearings Before the Committee on Armed Services, United States Senate, One Hundred Sixth Congress, Second Session, on S. 2549 ....

Front Cover

From inside the book

Other editions - View all

Common terms and phrases

Popular passages

Page 220 - ... agency" means an Executive agency, the Administrative Office of the United States Courts, and the Government Printing Office, but does not include — (i) a Government corporation; (ii) the Federal Bureau of Investigation, the Central Intelligence Agency, the Defense Intelligence Agency, the National Security Agency, and...
Page 67 - It is critical to maintain a long-term view and invest in research toward systems and operational techniques that yield networks capable of surviving attacks while protecting sensitive data. In doing so, it is essential to seek fundamental technological solutions and to seek proactive, preventive approaches, not just reactive, curative approaches.
Page 16 - Terrorists groups are increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and to communicate securely.
Page 61 - CERT/CC has seen an increase in the development and use of distributed sniffers, scanners, and denial-of-service tools. Attacks using these tools can involve a large number of sites simultaneously and be focused to attack one or more victim hosts or networks. Damaged systems include those used in the attack as well as the targeted victim. For the victim, the impact can be extensive. For example, in a denial-of-service attack using distributed technology, the attacked system observes simultaneous...
Page 395 - Consequence management" refers to measures to protect public health and safety, restore essential government services, and provide emergency relief to governments, businesses, and individuals affected by the consequences of terrorism...
Page 16 - Cyber terrorism' — by which I mean the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population — is thus a very real, though still largely potential, threat.
Page 14 - Insider threat The disgruntled organization insider is a principal source of computer crimes. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a victim system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat also includes outsourcing vendors. Virus writers Virus writers are posing an increasingly serious threat. Several destructive computer viruses and "worms" have harmed files...
Page 64 - Internet is designed to allow packets to flow easily across geographical, administrative, and political boundaries. Consequently, cooperation in tracing a single attack may involve multiple organizations and jurisdictions, most of which are not directly affected by the attack and may have little incentive to invest time and resources in the effort. This means that it is easy for an adversary to use a foreign site to launch attacks at US systems. The attacker enjoys the added safety of the need for...
Page 16 - information warfare" by foreign militaries against our critical infrastructures is perhaps the greatest potential cyber threat to our national security. We know that several foreign nations are developing information warfare doctrine, programs, and capabilities for use against the United States or other nations. Knowing that they cannot match our military might with conventional or "kinetic...
Page 173 - IPP program works to secure weapons of mass destruction expertise and know-how. Since the program's inception in 1994, more than 6,000 weapons scientists in Russia and the Newly Independent States have been supported through 400 non-military projects. The program partners Russian and NIS scientists with specialists at the Department's national laboratories and concentrates aggressively on the commercialization of projects that are cost-shared with US industry.

Bibliographic information