Page of

Cyber Security

Cyber Security

Securing Our Cyber Ecosystem

(p.241) Cyber Security
Advances in Cyber Security
Howard A. Schmidt
Fordham University Press

This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's Cyberspace Policy Review. The strategy calls for the creation of an Identity Ecosystem. The ecosystem's core is for the key components of a cyber transaction—namely the individual and organization identities, along with the identities of the infrastructure that handles transactions—to operate in a streamlined and safe manner, moving away from the culture of having different user names and passwords for each website. In its place, individuals voluntarily choose a secure privacy-enhancing credential to verify themselves for all types of online transactions from online banking, sending email, maintaining health records, or for any other personal cyber uses. The chapter goes on to describe the Comprehensive National Cyberspace Initiative (CNCI), which outlines a plan for sharing situational awareness among federal, state, and local governments, and private industry partners.

Keywords:   cyber security, cyber threats, cyber ecosystem, cyber crime, public-private partnerships, National Strategy for Trusted Identities in Cyberspace, Cyberspace Policy Review, Identity Ecosystem, online transactions, Comprehensive National Cyberspace Initiative

Sign In

Copyright © 2022. All rights reserved.
Privacy Policy and Legal Notice