Breaux, T. D., & Baumer, D. L. (2011). Legally “reasonable” security requirements: A 10-year FTC retrospective. Computers and Security, 30(4), 178-193. Retrieved from http://www.elsevier.com/cose [Full text available in the Web of Science database]
"Growth in electronic commerce has enabled businesses to reduce costs and expand markets by deploying information technology through new and existing business practices. However, government laws and regulations require businesses to employ reasonable security measures to thwart risks associated with this technology. Because many security vulnerabilities are only discovered after attacker exploitation, regulators update their interpretation of reasonable security to stay current with emerging threats. With a focus on determining what businesses must do to comply with these changing interpretations of the law, we conducted an empirical, multi-case study to discover and measure the meaning and evolution of “reasonable” security by examining 19 regulatory enforcement actions by the U.S. Federal Trade Commission (FTC) over a 10 year period. The results reveal trends in FTC enforcement actions that are institutionalizing security knowledge as evidenced by 39 security requirements that mitigate 110 legal security vulnerabilities."
Conti, G., Babbitt, T., & Nelson, D. (2011, May/June). Hacking competitions and their untapped potential for security education. IEEE Security and Privacy, 9(3), 56-59. Retrieved from http://www.computer.org/portal/web/sp/home [Full text available in the IEEE Computer Science Digital Library database]
"Academia and the computer security industry have widely adopted hacker competitions, such as DEF CON’s Capture the Flag (CTF), to augment information security education. Many other hacker competitions, however, are less known. Here we examine these untapped competitions’ potential and identify those that can energize and enhance information security education in both the classroom and the industry."
Gjelten, T. (2011, June 9). Divisions seen in administration over cybercrime. Retrieved from http://www.npr.org/2011/06/09/137070593/divisions-seen-in-administration-over-cyberthreats
Highlights conflict within the Obama administration over the severity of the threat of computer/hacking-related threats to national security:
"At issue is whether the nation faces the prospect of cyberwar and needs to prepare for it. The Pentagon says yes. Howard Schmidt, the White House coordinator for cybersecurity, sees such talk as "hype" and rejects the "cyberwar" term. "My father was in a war, my son has been in a war, I've been in a war, and this is not what we're going through right now," Schmidt said in an interview with NPR. "There are a whole lot of ramifications about using that term in any context, and even more in using the term 'cyberwar.'" [Audio and transcript available.]
Mueller, R. (2011, June 8). [Testimony before the Senate Judiciary Committee]. Retrieved from http://www.c-spanvideo.org/program/FBIDirec
Robert Mueller's testimony RE: the extension of his term as FBI director with discussion of cybersecurity-related threats. Searchable transcript with direct links to testimony segments available.
National Institute of Standards and Technology. (2011, June). Guide to industrial control system (ICS) security (Special Publication 800-82). Retrieved from http://csrc.nist.gov/publications/nistpubs/800-82/SP800-82-final.pdf
"[This publication] provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. Special Publication 800-82 provides an overview of ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks. This publication is the finalization of the final public draft, and includes updates with respect to the Risk Management Framework and current activities."
Panetta, L. et al. (2011, June 9). [Confirmation hearing for Secretary of Defense Leon Panetta]. Retrieved from http://www.c-spanvideo.org/program/DefenseConfirm
Numerous references to cybersecurity by Panetta, stressing its importance as a key security measure. Searchable transcript with direct links to testimony segments available.
Scholtz, T. (2011, May 4). Articulating the business value of information security. Retrieved from http://www.gartner.com [Full text available in the Gartner database]
"Clearly articulating the business value of information security remains one of the major obstacles that information security managers are facing. The benefits of information security must be translated into business terminology."