securing cyberspace for the 44th presidency

Upload: ar-bharchoondi

Post on 30-May-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    1/96

    Securing Cyberspacefor the 44

    thPresidency

    A Report of theCSIS Commission on Cybersecurity for the 44th Presidency

    Cochairs:Representative James R. LangevinRepresentative Michael T. McCaulScott CharneyLt. General Harry Raduege, USAF (Ret)

    Project Director:James A. Lewis

    Center for Strategic and International StudiesWashington, DCDecember 2008

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    2/96

    About CSIS

    In an era of ever-changing global opportunities and challenges, the

    Center for Strategic and International Studies (CSIS) provides

    strategic insights and practical policy solutions to decisionmakers.CSIS conducts research and analysis and develops policy

    initiatives that look into the future and anticipate change.

    Founded by David M. Abshire and Admiral Arleigh Burke at

    the height of the Cold War, CSIS was dedicated to the simple but

    urgent goal of finding ways for America to survive as a nation and

    prosper as a people. Since 1962, CSIS has grown to become one of

    the worlds preeminent public policy institutions.

    Today, CSIS is a bipartisan, nonprofit organization

    headquartered in Washington, D.C. More than 220 full-time staff

    and a large network of affiliated scholars focus their expertise on

    defense and security; on the worlds regions and the unique

    challenges inherent to them; and on the issues that know no

    boundary in an increasingly connected world.

    Former U.S. senator Sam Nunn became chairman of the CSIS

    Board of Trustees in 1999, and John J. Hamre has led CSIS as its

    president and chief executive officer since 2000.

    CSIS does not take specific policy positions; accordingly, all

    views expressed herein should be understood to be solely those of

    the authors.

    2008 by Center for Strategic and International Studies,

    Washington, D.C.

    All rights reserved.

    1800 K Street, NW

    Washington, D.C. 20006

    202/775-3175

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    3/96

    3

    Contents

    Preface

    Executive Summary 1

    Summary of Recommendations 5

    Introduction The Hidden Battle 11

    1 Create a Comprehensive National Security Strategy

    for Cyberspace 17

    2 Organizing for Cybersecurity 33

    3 Rebuilding Partnership with the Private Sector 43

    4 Regulate for Cybersecurity 49

    5 Identity Management for Cybersecurity 61

    6 Modernize Authorities 67

    7 Build for the Future 71

    Conclusion Winning the Hidden Battle 77

    Appendix A Commission Members 79

    Appendix B Expert Advisors to the Working Groups 84

    Appendix C List of Briefings 85

    Appendix D List of Acronyms 89

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    4/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    5/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    6/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    7/96

    1

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    8/96

    2

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    9/96

    3

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    10/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    11/96

    5

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    12/96

    6

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    13/96

    7

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    14/96

    8

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    15/96

    9

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    16/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    17/96

    11

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    18/96

    12

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    19/96

    13

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    20/96

    14

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    21/96

    15

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    22/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    23/96

    17

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    24/96

    18

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    25/96

    19

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    26/96

    20

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    27/96

    21

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    28/96

    22

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    29/96

    23

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    30/96

    24

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    31/96

    25

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    32/96

    26

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    33/96

    27

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    34/96

    28

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    35/96

    29

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    36/96

    30

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    37/96

    31

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    38/96

    32

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    39/96

    33

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    40/96

    34

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    41/96

    35

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    42/96

    36

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    43/96

    37

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    44/96

    38

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    45/96

    39

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    46/96

    40

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    47/96

    41

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    48/96

    42

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    49/96

    43

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    50/96

    44

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    51/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    52/96

    46

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    53/96

    47

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    54/96

    48

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    55/96

    49

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    56/96

    50

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    57/96

    51

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    58/96

    52

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    59/96

    53

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    60/96

    54

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    61/96

    55

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    62/96

    56

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    63/96

    57

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    64/96

    58

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    65/96

    59

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    66/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    67/96

    61

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    68/96

    62

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    69/96

    63

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    70/96

    64

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    71/96

    65

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    72/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    73/96

    67

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    74/96

    68

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    75/96

    69

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    76/96

    70

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    77/96

    71

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    78/96

    72

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    79/96

    73

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    80/96

    74

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    81/96

    75

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    82/96

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    83/96

    77

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    84/96

    78

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    85/96

    79

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    86/96

    80

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    87/96

    81

    Franklin Reeder

    Chair, Center for Internet Security

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    88/96

    82

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    89/96

    83

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    90/96

    84

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    91/96

    85

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    92/96

    86

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    93/96

    87

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    94/96

    88

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    95/96

    89

  • 8/9/2019 Securing Cyberspace for the 44th Presidency

    96/96