Homeland Security: Securing Our Nation's Critical Infrastructure
Homeland Security: Securing Our Nation's Critical Infrastructure
Homeland Security: Securing Our Nation's Critical Infrastructure
Presented to
The National Federation Debate Topic Selection Meeting
August 2008
Austin, Texas
Proposed by:
Ruth Kay
Detroit Country Day School
Beverly Hills, Michigan
Cyber Security Page 2 of 35
“A young computer whizz kid accidentally connects into a top secret super-computer
which has complete control over the U.S. nuclear arsenal. It challenges him to a game
between America and Russia, and he innocently starts the countdown to World War 3.”
(IMDB 2008)
You’re right if you guessed this was the plot of a 1983 Matthew Broderick movie
entitled War Games. But today, the scenario is all too real. Hackers, terrorists,
criminals and “computer whizz kids” are gaining access to some of our nation’s critical
infrastructures. The access that they can achieve is both amazing and frightening.
Clearly, we are a nation at risk. Something needs to be done to protect the computer
systems and networks that control our infrastructure.
THE PROBLEM
Computer technology is a part of every facet of our lives. We rely on it for the laptops
that we won’t go anywhere without to the computer systems that control our nuclear
weapons. None of these systems are self contained. All are dependent on a connection
outside of their own system. It is this outside connection that leaves them vulnerable to
intrusion. A government report, A National Strategy to Secure Cyberspace explains this
technological reliance,
For the United States, the information technology revolution quietly changed the
way business and government operate. Without a great deal of thought about
security, the Nation shifted the control of essential processes in manufacturing,
utilities, banking, and communications to networked computers. As a result, the
cost of doing business dropped and productivity skyrocketed. The trend toward
greater use of networked systems continues.
By 2003, our economy and national security became fully dependent upon
information technology and the information infrastructure. A network of networks
directly supports the operation of all sectors of our economy—energy (electric
power, oil and gas), transportation (rail, air, merchant marine), finance and banking,
information and telecommunications, public health, emergency services, water,
chemical, defense industrial base, food, agriculture, and postal and shipping. The
reach of these computer networks exceeds the bounds of cyberspace. They also
control physical objects such as electrical transformers, trains, pipeline pumps,
chemical vats, and radars. (2003)
Ever since the computer modem became widely available, people have been attempting
to “hack” into other computer systems. Some do it for just the thrill of the
accomplishment; others “hack” for more sinister purposes. These are the individuals that
cost private citizens, businesses and governments billions of dollars with no end in site.
Ralph Logan, of the Logan Group, a cybersecurity firm was quoted in the Washington
Post this past January as saying:
Cyber Security Page 3 of 35
Over the past year to 18 months, there has been "a huge increase in focused attacks
on our national infrastructure networks, . . . and they have been coming from outside
the United States," (2008)
Attacks on our critical infrastructure are not to be taken lightly. Homeland Security
Chief Michael Chertoff warned in 2007 that, "The consequences of an assault against
America's vast network of critical infrastructure sites could be dire, both in loss of life
and in economic impact…" Under Chertoff’s leadership the Department of Homeland
Security has identified seventeen areas as “critical infrastructure” that must be
protected.
Identification of the problem is not enough. Cyber attacks on our computer network can
have broad range consequences that we are ill prepared for. The federal government has
called for action and cooperation with the private sector but they have yet to set forth any
specific requirements. Kathryn Picanso of Fordham University School of Law points out
our vulnerability,
Network attacks can have serious ramifications on national security, as both the
military and the national economy are increasingly reliant on critical infrastructures
and information systems. n24 Critical infrastructures are "those physical and cyber-
based systems essential to the minimum operations of the economy and
government," n25 many of which are privately owned and operated. n26 Recognizing
that the failure to protect information networks could disrupt essential operations,
and cause loss of revenue, intellectual property, and even life, the federal
government has called for collaboration between industry, government, academia,
and nongovernmental groups to protect the nation's critical infrastructure, but has
stopped short of imposing specific security measures. n27 (2006)
Each one of the seventeen areas identified by Homeland Security pose a unique threat to
our economic lives and our national security. An attack on our banking and finance
system alone would cripple the nation. In a May 2007 report on Banking and Finance the
Department of Homeland Security outlined the importance of this sector of our lives.
The Banking and Finance Sector accounts for more than 8 percent of the U.S. annual
gross domestic product and is the backbone for the world economy. As direct attacks
Cyber Security Page 4 of 35
Our nation’s energy supply is also at risk. In many instances our current level of
protection and the lack of a specific threat have lulled us into a false sense of security. A
report by Forbes Magazine brings reality to our complacency.
The first time Scott Lunsford offered to hack into a nuclear power station, he was told
it would be impossible. There was no way, the plant's owners claimed, that their
critical components could be accessed from the Internet. Lunsford, a researcher for
IBM's Internet Security Systems, found otherwise.
"It turned out to be one of the easiest penetration tests I'd ever done," he says. "By the
first day, we had penetrated the network. Within a week, we were controlling a
nuclear power plant. I thought, 'Gosh. This is a big problem.'" (2007)
Just imagine the havoc Lunsford could have caused if he had sinister motives. But wait,
we really don’t have to imagine it. The Midwest blackout of August 14, 2003, although
not intrusion related, gave us just a taste of what could really happen if a terrorist or other
intruder were to shut down our electrical grid. An article by Jeremy Johnson and Alex
Lefebvre outlines just some of the impact that the blackout had:
The blackout that began last Thursday, cutting electrical power to more than 50
million people in the US and Canada, exacted a heavy toll—causing not only
widespread inconvenience but threatening the safety, lives and economic well-being of
residents, as well as small and medium-sized businesses…
…However, in the days since the blackout, the human, environmental and economic
effects of the event continue to add up. The impact in the New York metropolitan
area—the nation’s financial center—was particularly sharp, with the city brought to a
standstill for a day and a half…
…Economic losses from the blackout exceeded $1 billion in New York City alone,
according to figures released Monday by city comptroller William Thompson. The
estimates include $800 million in unsold goods and services, as well as $250 million in
spoiled food…
…Detroit-area food poisoning claims have skyrocketed since the power outage. A
family of 10 was stricken with food poisoning after eating in a Macomb County fast
food restaurant. Mount Clemens General Hospital in Macomb County reported that
one patient became ill after drinking tap water. Nine patients were admitted to the
emergency room at Beaumont Hospital in Royal Oak for food poisoning.
Johnson and Lefebvre just scratch the surface of the economic and safety impact of the
blackout. Whereas this blackout was not terrorist related, the threat of a terrorist attack in
this manner is all too real. The St. Petersburg Times reported:
In 2002, hackers in Venezuela were able to shut down part of that country's oil and
gas industry. Hackers have already caused multi-city blackouts outside the United
States, and there are indications that attempts have been made to breach vital power
systems within the country. (2008)
The threats to our security are growing exponentially and the government is not keeping
pace. National Security Czar Greg Garcia outlined some of the difficulty.
Clearly, we are a nation at risk. The question is what is being done to prevent disaster?
CURRENT EFFORTS
Much of our critical infrastructure is owned and/or operated by the private sector.
Therefore, the initial government response has been to leave protection to the private
sector. The difficulty is that the first concern of the private sector is what’s best for
business not necessarily what’s best for society or national security. Authors Michael
Gallaher, Albert Link and Brent Rowe in their book Cyber Security: Economic
Cyber Security Page 6 of 35
Strategies and Public Policy Alternatives explain the problem with private sector
solutions.
However, private sector organisations do not have the information they need to
make efficient decisions from a private perspective -- what’s in their best interest --
or a social perspective -- what’s in the best interest of society. They collect what
information they can with given resources, and then make decisions based on their
budget constraints.
In some cases, they may underestimate the costs imposed by security breaches,
however, there is no research to support the assertion that they are not acting in
their best interest given the information they have available.
Since September 11th the government has tried to elevate the importance of cyber
security. The myriad of government agencies, commissions, and councils assigned to
oversee our cyber security read like alphabet soup and include: the NIPP (National
Infrastructure Protection Program), SSPs (Sector Specific Plans), US_CERT (United
States Computer Emergency Readiness Team), CSSP (Control Systems Security
Program), NCSD (National Cyber Security Division) and a whole host of others. The job
of most of these agencies is to oversee, report and prescribe ways that private industry
can respond to cyber threats and attacks. The government does little to actually regulate
and require protocol for computer/network security. The Department of Homeland
Security has outlined the role the government should play in cyber security.
• Developing a comprehensive national plan for securing the key resources and
critical
infrastructure of the United States;
• Providing crisis management in response to attacks on critical information systems;
• Providing technical assistance to the private sector and other government entities
with respect to emergency recovery plans for failures of critical information systems;
• Coordinating with other agencies of the federal government to provide specific
warning information and advice about appropriate protective measures and
countermeasures to state, local, and nongovernmental organizations including the
private sector, academia, and the
public; and
• Performing and funding research and development along with other agencies
that will lead to new scientific understanding and technologies in support of
homeland security.
Consistent with these responsibilities, DHS will become a federal center of excellence
for cybersecurity and provide a focal point for federal outreach to state, local, and on
governmental organizations including the private sector, academia and the public.
(DHS 2003)
Cyber Security Page 7 of 35
The reactionary nature of our official response has caused an outcry by some for the
government to take a much more proactive role in cyber security. According to
Gallaher, Link and Rowe the government role has been limited to motivating industry
to adopt new technologies and protections, “In the past, government has attempted to
develop and motivate the use of new technologies or standards that would improve
security.” But more is needed. The government needs to take the lead in regulating
industries responsible for our critical infrastructure to avoid disaster. A Forbes
Magazine article “America’s Hackable Backbone”, August 2007, argues that private
sector control of computer systems so vital to our critical infrastructure may not be in
the nation’s best interest.
That kind of risk means major security changes are necessary, says Christy. But
because SCADA [Supervisory Control and Data Acquisition software] systems are
largely owned by the private sector, critical infrastructure like power plants and water
systems may remain vulnerable until the problem affects profits--or leads to disaster.
Christy argues that we can't wait that long: His unofficial opinion is that SCADA
needs government regulation.
"The government mandates fire sprinklers. Those cost builders money, but they save
property and lives," he says. "If critical infrastructure is important to our national
security, shouldn't there be minimum standards it has to meet?"
Current efforts by the government and private sector have failed to provide the necessary
security for the computer systems and networks that control the very technological
backbone of our nation. Much work needs to be done.
In the end of the movie War Games [spoiler alert], Matthew Broderick is able to teach the
computer the ultimate futility of a nuclear attack by teaching it tic-tac-toe. Unfortunately,
the solution to the cyber security of nation’s critical infrastructure is never going to be as
simple as a game of tic-tac-toe.
Cyber Security Page 8 of 35
Resolutions:
1. Resolved that the United States federal government should substantially increase
the cyber security of critical infrastructures in the United States
2. Resolved that the United States federal government should substantially increase
cyber security in one or more of the following areas: defense industrial base,
banking and finance, transportation
3. Resolved that the United States federal government should establish a policy
substantially increasing cyber security in one or more of the following areas:
defense industrial base, banking and finance, transportation
4. Resolved that the United States federal government should establish a policy
substantially increasing the cyber security of our nation’s critical infrastructures
5. Resolved that the United States federal government should substantially increase
the cyber security of our nation’s critical infrastructures
6. Resolved that the United States federal government should substantially increase
protection of the computer systems and networks supporting critical infrastructure
in the United States
Timeliness: The debate over the security of our critical infrastructure has never been timelier. The
threat of new terrorist attacks based in technology is real and frightening. Not only are terrorist a concern
but criminals interested in record theft or extortion and even your average kid with a computer and desire to
hack have become threats to our privacy, security and livelihoods. There has been a sufficient time since
the terrorist attacks of 9/11 for the government to turn their attention to cyber security of our infrastructure,
but little has been done. The government has begun some efforts and we are beginning to see just how
ineffective these efforts are in securing our technology.
Scope: Since the topic involves United States cyber security it can impact a wide variety of areas from
transportation to banking to our defense industry. The topic also impacts the country as a whole. There
isn’t any one part of our nation that would be immune to the impact a breach in cyber security would have
on our critical infrastructure. It could also have a personal impact on individuals. The big Midwest
blackout of 2003 showed us just how much we rely on just one part of our critical infrastructure, our
electrical grid. Moreover, it has implications outside of the United States in the form of terrorism,
international relations, and trade. The scope of this topic makes it uniquely debatable for any high school
in the nation.
Range: The topic provides opportunities for debaters of all experience and skill levels. There will be
good debate on all of the stock issues along with counterplan ground and critical arguments. Debaters can
choose to delve into a rights debate, utilitarianism, crime and/or terrorism. Novice debaters will find a host
of policy impacts based on our vulnerability and the probability of terrorist or criminal attack on our
Cyber Security Page 9 of 35
infrastructure. Varsity debaters will be challenged by critical argumentation or the depth of such arguments
as the interrelationship of government action and economic/free market forces.
Quality: The quality of the debate on the topic of cyber security is not at all lacking. Debaters will be
dealing with real world issues that face our government, private sector businesses and individual citizens.
The wealth of information available and the interest that most teens have in technology will ensure that
debates are lively and the argumentation is solid.
Material: I don’t think I’ve seen a topic in the recent past that rivals this one in terms of availability of
information. The technological nature of the topic makes it fertile ground for internet research. The topic
is about the internet and computer networks so the internet is the home of a whole host of private and
government reports, technology magazines and journals and a variety of websites by everyone with an
opinion. But the research is not limited to the internet. The immediacy of the topic has fostered a plethora
of books and print material on the subject. Hardly a day goes by where you can’t pick up a newspaper and
see some article regarding the cyber security of our nation’s infrastructure.
Interest: Technology, computers, internet, hacking…need we say more. This is a teenagers’ dream
topic. But the beauty of this topic is that as educators we can take that interest and focus it in a way that
allows our students to see more than just the inconvenience (or life changing disaster of their world) when
ITunes fall victim to a hacker. Students can learn how the technological world is interrelated with
government and industry along with how it reaches far beyond their computer keyboard and Google chat.
Balance: The wide variety of negative arguments along with the variations of affirmative plan options
proves this a very balanced topic area. We have the affirmative option of government action mechanisms in
the form of implementing standards, improving physical structures, and/or training personnel. These
mechanisms can be utilized in a variety of areas from banking and finance to our defense industries. While
the negative has the ground of rights versus government action, state action, free market/private sector
action, business and economic arguments. Both sides in the debate may be arguing trade, international
relations, world economy impacts etc. A more specific list of affirmative and negative areas is included
below.
Banking
Definitions of banking on the Web:
• engaging in the business of keeping money for savings and checking accounts or for exchange or
for issuing loans and credit etc.
• transacting business with a bank; depositing or withdrawing funds or requesting a loan etc.
wordnet.princeton.edu/perl/webwn
• A banker or bank is a financial institution that acts as a payment agent for customers, and borrows
and lends money. ...
en.wikipedia.org/wiki/Banking
• The Banking (Special Provisions) Act 2008 (2008 c. 2) is an Act of the United Kingdom that was
introduced in order to enable the UK government to nationalise high-street banks under
emergency circumstances by secondary legislation. ...
en.wikipedia.org/wiki/Banking (Special Provisions) Act 2008
• including Banks, Credit Cards, Currency, and Travellers Cheques
smartphone-software.handster.com/programs.php
v. tr.
4. To construct with a slope rising to the outside edge: The turns on the racetrack were steeply
banked.
5.
a. To tilt (an aircraft) laterally and inwardly in flight.
b. To tilt (a motor vehicle) laterally and inwardly when negotiating a curve.
6. Games To strike (a billiard ball) so that it rebounds from the cushion of the table.
7. Sports To play (a ball or puck) in such a way as to make it glance off a surface, such as a
backboard or wall.
v. intr.
WordNet -
banking
noun
1. engaging in the business of keeping money for savings and checking accounts or for exchange or for
issuing loans and credit etc.
2. transacting business with a bank; depositing or withdrawing funds or requesting a loan etc.
jurisdiction of the Department of Banking. Today, the Nebraska Department of Banking and Finance
regulates and supervises various financial industries on behalf of the State of Nebraska and its residents.
Control
Definitions of control on the Web:
noun
1. power to direct or determine; "under control"
2. a relation of constraint of one entity (thing or person or group) by another; "measures for the control of
disease"; "they instituted controls over drinking on campus"
3. (physiology) regulation or maintenance of a function or action or reflex etc; "the timing and control of
his movements were unimpaired"; "he had lost control of his sphincters"
4. a standard against which other conditions can be compared in a scientific experiment; "the control
condition was inappropriate for the conclusions he wished to draw" [syn: control condition]
5. the activity of managing or exerting control over something; "the control of the mob by the police was
admirable"
6. the state that exists when one person or group has power over another; "her apparent dominance of her
husband was really her attempt to make him pay attention to her" [syn: dominance]
7. discipline in personal and social activities; "he was a model of polite restraint"; "she never lost control
of herself" [syn: restraint] [ant: unrestraint]
8. great skillfulness and knowledge of some subject or activity; "a good command of French" [syn:
command]
9. a mechanism that controls the operation of a machine; "the speed controller on his turntable was not
working properly"; "I turned the controls over to her"
10. a spiritual agency that is assumed to assist the medium during a seance
11. the economic policy of controlling or limiting or curbing prices or wages etc.; "they wanted to repeal all
the legislation that imposed economic controls"
verb
1. exercise authoritative control or power over; "control the budget"; "Command the military forces"
2. lessen the intensity of; temper; hold in restraint; hold or keep within limits; "moderate your alcohol
intake"; "hold your tongue"; "hold your temper"; "control your anger"
Cyber Security Page 14 of 35
3. handle and cause to function; "do not operate machinery after imbibing alcohol"; "control the
lever" [syn: operate]
4. control (others or oneself) or influence skillfully, usually to one's advantage; "She manipulates her
boss"; "She is a very controlling mother and doesn't let her children grow up"; "The teacher knew how
to keep the class in line"; "she keeps in line" [syn: manipulate]
5. check or regulate (a scientific experiment) by conducting a parallel experiment or comparing with
another standard; "Are you controlling for the temperature?"
6. verify by using a duplicate register for comparison; "control an account"
7. be careful or certain to do something; make certain of something; "He verified that the valves were
closed"; "See that the curtains are closed"; "control the quality of the product" [syn: see]
8. have a firm understanding or knowledge of; be on top of; "Do you control these data?" [syn: master]
Critical infrastructures
Ian Patrick McGinley, Associate, Gibson, Dunn & Crutcher LLP. J.D, Yeshiva University Cardozo
Public Law, Policy & Ethics Journal Fall, 2007 p. ln
The definition of "critical infrastructure" varies as well. According to the Critical Infrastructure Protection
Act of 2001, critical infrastructures are "systems and assets, whether physical or virtual, so vital to the
United States that the incapacity or destruction of such systems and assets would have a debilitating impact
on security, national economic security, national public health or safety or any combination of those
matters." n81 President Bush's National Strategy for the Physical Protection of Critical Infrastructures and
Key Assets defines the term more specifically, pointing to thirteen separate sectors containing critical
infrastructure: agriculture, food, water, public health, emergency services, government, defense industrial
bases, information and telecommunications, energy, transportation, banking and finance, chemical industry
and hazardous materials, and postal and shipping. n82 In addition, the National Strategy for the Physical
Protection of Critical Infrastructure defines two types of key assets: (1) those whose destruction would
cause large scale casualties (e.g. nuclear power plants); and (2) those of symbolic national value (e.g.
monuments). n83 In total, there are well over one million critical infrastructures and key assets in the United
States; n84 defending them is an enormous and expensive task.
The White House, “December 17, 2003 Homeland Security Presidential Directive/Hspd-7”
Critical infrastructure and key resources provide the essential services that underpin American society. The
Nation possesses numerous key resources, whose exploitation or destruction by terrorists could cause
catastrophic health effects or mass casualties comparable to those from the use of a weapon of mass
destruction, or could profoundly affect our national prestige and morale. In addition, there is critical
infrastructure so vital that its incapacitation, exploitation, or destruction, through terrorist attack, could have
a debilitating effect on security and economic well-being.
http://www.whitehouse.gov/news/releases/2003/12/20031217-5.html
Cyber Infrastructure
NASCIO-Representing Chief Information Officers of the State “Strengthening Cyber Security in the
States” April 2008
This cyber infrastructure includes electronic information and communications systems, and the information
contained in those systems. These threat vectors continue to grow in numbers, as well as severity.
http://www.nascio.org/advocacy/dcFlyIn/callForAction08.pdf
Cyber Security Page 15 of 35
Cyber security
Definitions of cyber security on the Web:
Cyber Security Research and Development Center, Department of Homeland Security, 2008
The Cyber Security R&D Center was established by the Department of Homeland Security in 2004 to
develop security technology for protection of the U.S. cyber infrastructure. http://www.cyber.st.dhs.gov/
Cyberspace
Thomas C. Folsom, Associate Professor, Regent University School of Law, “Defining Cyberspace
(Finding Real Virtue in the Place of Virtual Reality)” Tulane Journal of Technology & Intellectual
Property Spring, 2007 p. ln
The law has neither defined cyberspace nor its values. As a result, the attempt to apply legal rules of
"ordinary" space to cyberspace fails to address either the ordinary or the extraordinary features of the new
space. This Article proposes that cyberspace be defined as an embodied switched network for moving
information traffic, further characterized by degrees of access, navigation, information-activity,
augmentation (and trust). Legal conflicts, whether sounding in contract, trademark, copyright, personal
jurisdiction, choice of law, or some other basis, occasionally occur in an objective cyberspace whose values
can be sufficiently operationalized for legal analysis. If cyberspace were so defined, the law could better
respond to new technological uses.
• A term coined by author William Gibson. It describes the imaginary space in which computer
users travel when "surfing" the Internet.
www.greyfoxwebworks.com/webterms.html
• Any area beyond the realm of one's own computer to interact with other computer systems and/or
people.
marketconnect.bbandt.com/bbandt/internet_glosry_C.htm
• This is a term that gives us a way to sort of "see" what we are surfing while on the Net. It's a
generic term for the entire Internet, not just the World Wide Web.
www.elitehackers.info/glossary.php
• The global network of interconnected computers and communication systems.
www.psycom.net/iwar.2.html
• an internet word. All of the internet occurs in "cyberspace." return
www.california.com/~rathbone/local2.htm
• The universe created by computer networks.
www.rainwater.com/glossary/c.html
• The non-physical space where interaction takes place between computer networks.
web.worldbank.org/WBSITE/EXTERNAL/WBI/0,,contentMDK:20169611~isCURL:Y~menuPK:
654498~pagePK:209023~piPK:207535~theSitePK:213799,00.html
Cyberspace is their nervous system—the control system of our country. Cyberspace is composed of
hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that
allow our critical infrastructures to work.
noun
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network
protocols to facilitate data transmission and exchange [syn: internet]
The space in which computer transactions occur, particularly transactions between different computers. We
say that images and text on the Internet exist in cyberspace, for example. The term is also often used in
conjunction with virtual reality, designating the imaginary place where virtual objects exist. For example, if
a computer produces a picture of a building that allows the architect to “walk” through and see what a
design would look like, the building is said to exist in cyberspace.
Defense industry
Definitions of defense industry on the Web:
• A wide ranging industry based on the production of military hardware and supplies such as
aircraft, ships, submarines, tanks, guns, bombs, bullets ...
www.moneymatters101.com/startingabusiness/bust/bustd.asp
• The defense industry, also called the military industry, is comprised of government and
commercial industry involved in research, development ...
en.wikipedia.org/wiki/Defense industry
DEFENSE INDUSTRY
Cyber Security Page 17 of 35
Wikipedia, http://en.wikipedia.org/wiki/Defense_industry
The defense industry, also called the military industry, is comprised of government and commercial
industry involved in research, development, production, and service of military equipment and facilities. It
includes:
• Private military contractors: private companies that provide logistics, manpower, and other
expenditures for a military force.
• European defence procurement, which is more or less analogous to the U.S. "military-industrial
complex."
http://www.bis.doc.gov/defenseindustrialbaseprograms/index.htm
BIS is the focal point within the Department of Commerce for developing, promoting, and implementing policies
that ensure a strong, technologically superior U.S. defense industrial base. Congressional mandates and executive
orders provide BIS with unique authorities to manage these program responsibilities.
Second, both the dual-use and munitions control systems have not been geared to
consider the effect of controls on the defense industrial base, which now includes both
defense contractors and commercial firms that supply off-the-shelf items for defense
purposes. All such firms must be able to survive in the commercial marketplace, but
export controls often are an obstacle to a successful business plan. Defense Department
acquisitions no longer are the sole determinant of long-term survival for the defense
industrial base. Current pending reforms in the control systems are essential to improving
the survivability of the defense industrial base.
Finance
Definitions of finance on the Web:
WordNet -
finance
noun
1. the commercial activity of providing funds and capital
2. the branch of economics that studies the management of money and other assets
3. the management of money and credit and banking and investments
verb
1. obtain or provide money for; "Can we finance the addition to our home?"
2. sell or provide on credit
Fi*nance"\, n. [F., fr. LL. financia payment of money, money, fr. finare to pay a fine or subsidy (cf. OF.
finer to finish, pay), fr. L. finis end. See Fine, n., Finish.]
1. The income of a ruler or of a state; revennue; public money; sometimes, the income of an individual;
often used in the plural for funds; available money; resources.
All the finances or revenues of the imperial crown. --Bacon.
2. The science of raising and expending the public revenue. "Versed in the details of finance." --Macaulay.
Improve
improve
vt.
1 [Now Rare] to use profitably or to good advantage !to improve one‘s leisure by studying"
2 to raise to a better quality or condition; make better
>3 to make (land or structures) more valuable by cultivation, construction, etc.
vi.
to become better in quality or condition
improve on (or upon) to do or make better than, as by additions or changes
SYN.—improve and better both imply a correcting or advancing of something that is not in itself necessarily bad, the former by
supplying a lack or want [to improve a method] and the latter by seeking something more satisfying [he‘s left his job to better
himself]; ameliorate implies a bad, oppressive, or intolerable condition to begin with [to ameliorate the lot of the poor] —ANT.
worsen, impair
(Webster's New World Dictionary. Accent Software International. Macmillan Publishers. Version 1.0 1997.)
Improve: to make or become better or of higher quality or value; to make or cause something to make progress Example: must
improve his appearance if he wants this job Example: Her health has improved lately
Cyber Security Page 20 of 35
(Concise Dictionary is © (1998,1999) AND Classification Data Ltd., Oxford, UK and database rights are © (1998,1999) AND
Classification Data Ltd. All rights reserved)
Improve
1. To disprove or make void; to refute
2. To disapprove; to find fault with; to reprove; to censure; as, to improve negligence.
(The Webster's Dictionary)
Improve
1. To make better; to increase the value or good qualities of; to ameliorate by care or cultivation; as, to improve land
2. To use or employ to good purpose; to make productive; to turn to profitable account; to utilize; as, to improve one's time; to
improve his means
3. To advance or increase by use; to augment or add to; -- said with reference to what is bad
4. To grow better; to advance or make progress in what is desirable; to make or show improvement; as, to improve in health.
5. To advance or progress in bad qualities; to grow worse
6. To increase; to be enhanced; to rise in value; as, the price of cotton improves
(The Webster's Dictionary)
im·prove
v. im·proved, im·prov·ing, im·proves
v. tr.
To raise to a more desirable or more excellent quality or condition; make better.
To increase the productivity or value of (land or property).
To put to good use; use profitably.
v. intr.
To become better.
To make beneficial additions or changes: improve on the translation
(The American Heritage® Dictionary of the English Language, Fourth Edition
Copyright © 2000 by Houghton Mifflin Company)
Networks
Definitions of networks on the Web:
• Networks are composed of complementary nodes and links. The crucial defining feature of
networks is the complementarity between the various nodes ...
www.stern.nyu.edu/networks/dictionary.html
• Networks are the essential means of linking one group of agents to others whom they affect. They
are the intricate links based on trust and reciprocal patterns of communication and exchange
between producers and clients that are necessary to ensure an economic capability and
responsiveness ...
www.rri.wvu.edu/WebBook/Danson/glossaryterms.htm
• Although there is no consensus definition of "program" or "networks", these terms are most often
encountered and understood in ...
www.genomicglossaries.com/content/printpage.asp
• A computer network is a group of computers that are linked so that information can travel between
the computers. The computers could be in the same room and linked via copper cables, or located
in different countries, linked by satellites, phone lines or fibre optic cables. ...
www.michigan.gov/cybersecurity/0,1607,7-217-34415---,00.html
• Two or more computers physically joined together so they can share files and information.
www.personal.psu.edu/bxb11/CBTGuide/Append/Gloss.htm
1. An openwork fabric or structure in which cords, threads, or wires cross at regular intervals.
2. Something resembling an openwork fabric or structure in form or concept, especially:
Cyber Security Page 21 of 35
Our Nation’s critical infrastructures are composed of public and private institutions in
the sectors of agriculture, food, water, public health, emergency services, government, defense industrial
base, information and telecommunications, energy, transportation, banking and finance, chemicals and
hazardous materials, and postal and shipping.
protection
• the activity of protecting someone or something; "the witnesses demanded police protection"
• protective covering: a covering that is intend to protect from damage or injury; "they had no
protection from the fallout"; "wax provided protection for the floors"
• security: defense against financial failure; financial independence; "his pension gave him security
in his old age"; "insurance provided protection against loss of wages due to illness"
Cyber Security Page 22 of 35
• the condition of being protected; "they were huddled together for protection"; "he enjoyed a sense
of peace and protection in his new home"
• auspices: kindly endorsement and guidance; "the tournament was held under the auspices of the
city council"
• the imposition of duties or quotas on imports in order to protect domestic industry against foreign
competition; "he made trade protection a plank in the party platform"
• payment extorted by gangsters on threat of violence; "every store in the neighborhood had to pay
him protection"
wordnet.princeton.edu/perl/webwn
pro·tec·tion·al, adjective
—Synonyms 1. security, refuge, safety. 2. guard, defense, shield, bulwark. See COVER. 3. aegis,
sponsorship. 7. pass, permit.
1.
a. The act of protecting.
b. The condition of being protected.
c. Money extorted by racketeers threatening violence for nonpayment.
d. Bribes paid to officials by racketeers for immunity from prosecution.
2. One that protects.
3. A pass guaranteeing safe-conduct to travelers.
4. A system of tariffs or other measures protecting domestic producers from foreign competition.
5. A contraceptive or barrier that lowers the risk of pregnancy or infection, especially a condom.
6. Slang
a. Money extorted by racketeers threatening violence for nonpayment.
b. Bribes paid to officials by racketeers for immunity from prosecution.
.
WordNet Princeton University 2008
Cyber Security Page 23 of 35
protection
noun
1. the activity of protecting someone or something; "the witnesses demanded police protection"
2. a covering that is intend to protect from damage or injury; "they had no protection from the fallout";
"wax provided protection for the floors" [syn: protective covering]
3. defense against financial failure; financial independence; "his pension gave him security in his old age";
"insurance provided protection against loss of wages due to illness" [syn: security]
4. the condition of being protected; "they were huddled together for protection"; "he enjoyed a sense of
peace and protection in his new home"
5. kindly endorsement and guidance; "the tournament was held under the auspices of the city council" [syn:
auspices]
6. the imposition of duties or quotas on imports in order to protect domestic industry against foreign
competition; "he made trade protection a plank in the party platform"
7. payment extorted by gangsters on threat of violence; "every store in the neighborhood had to pay him
protection"
Regulating
Regulate \Reg"u*late\ (-l[=a]t), v. t. [imp. & p. p. Regulated (- l[=a]`t[e^]d); p. pr. & vb.
n. Regulating.] [L. regulatus, p. p. of regulare, fr. regula. See Regular.] 1. To adjust by
rule, method, or established mode; to direct by rule or restriction; to subject to governing
principles or laws.
The laws which regulate the successions of the seasons. --Macaulay.
The herdsmen near the frontier adjudicated their own disputes, and regulated their own
police. --Bancroft.
2. To put in good order; as, to regulate the disordered state of a nation or its finances.
3. To adjust, or maintain, with respect to a desired rate, degree, or condition; as, to
regulate the temperature of a room, the pressure of steam, the speed of a machine, etc.
To regulate a watch or clock, to adjust its rate of running so that it will keep
approximately standard time.
Cyber Security Page 24 of 35
Security vs Defense
Sean M. Condron, Associate Professor, International and Operational Law Harvard Journal of Law
and Technology Spring 2007 p. ln
Notwithstanding these definitional problems, government policy distinguishes between security and
defense. With these distinctions, the government emphasizes security over defense with regard to
cyberspace. The agency hierarchy is evidence of this priority. Under the National Strategy to Secure
Cyberspace, the Department of Homeland Security assumes the lead role for cyber security, n54 with the
Department of Defense relegated to a minor, supporting role. n55 Yet there is no comparable national
strategy for cyber defense. This oversight has left a gaping hole in the protection of United States critical
infrastructure because the Department of Homeland Security bases its concept of "security" on prevention
and repair, n56 whereas the concept of defense has traditionally entailed a wider range of options. This
section will outline some preliminary ideas about possible components that could be used to craft a cyber
defense strategy.
Supporting
Definitions of supporting on the Web:
• encouraging: furnishing support and encouragement; "the anxious child needs supporting and
accepting treatment from the teacher"
• support: the act of bearing the weight of or strengthening; "he leaned against the wall for support"
• load-bearing(a): capable of bearing a structural load; "a supporting wall"
wordnet.princeton.edu/perl/webwn
• the action of the verb to support; that supports
en.wiktionary.org/wiki/supporting
• statements--The lead-in is followed by supporting statements. This is the specific detailed
information.4bwtthe lead-in.
www.gaaged.org/Browseable_Folders/Curriculum/Lesson%20Plans/Agricultural%20Animal%20
Production%20&%20Management-01432/01432-
03.2%20Selection%20&%20Judging%20Beef%20Cattle.doc
• a structure used for the support of a monorail or crane system.
www.clevelandtramrail.com/info.asp
n.
1.
a. The act of supporting.
b. The state of being supported.
2. One that supports.
3. Maintenance, as of a family, with the necessities of life.
adjective
1. furnishing support and encouragement; "the anxious child needs supporting and accepting treatment
from the teacher" [syn: encouraging]
2. capable of bearing a structural load; "a supporting wall" [syn: load-bearing]
noun
1. the act of bearing the weight of or strengthening; "he leaned against the wall for support" [syn: support]
Strengthen
Definitions of strengthen on the Web:
• make strong or stronger; "This exercise will strengthen your upper body"; "strengthen the relations
between the two countries"
• gain strength; "His body strengthened"
• tone: give a healthy elasticity to; "Let's tone our muscles"
wordnet.princeton.edu/perl/webwn
• To make strong or stronger; to add strength to; to increase the strenght of; as, to strengthen a limb,
a bridge, an army; to strengthen an obligation; to strengthen authority; to fortify; to reinforce; To
animate; to give moral strength; to encourage; to fix in resolution; to hearten; To ...
en.wiktionary.org/wiki/strengthen
strength·en
v. strength·ened, strength·en·ing, strength·ens
v. tr.
To make strong or increase the strength of.
v. intr.
To become strong or stronger.
verb
1. make strong or stronger; "This exercise will strengthen your upper body"; "strengthen the relations
between the two countries" [ant: weaken]
2. gain strength; "His body strengthened" [ant: weaken]
3. give a healthy elasticity to; "Let's tone our muscles" [syn: tone]
Strengthen: To make or become stronger. (New Oxford American Dictionary. Elizabeth J. Jewell & Frank Abate, editors. NY:
Oxford U., 2001, p. 1685)
Strengthen: To make strong or increase the strength of. (The American Heritage Dictionary of the English Language, 4th Ed.,
Boston: Houghton Mifflin, 2000, p. 1714)
Transportation
Definitions of transportation on the Web:
• transportation system: a facility consisting of the means and equipment necessary for the
movement of passengers or goods
• the act of moving something from one location to another
• fare: the sum charged for riding in a public conveyance
• Department of Transportation: the United States federal department that institutes and coordinates
national transportation programs; created in 1966
• the commercial enterprise of moving goods and materials
• exile: the act of expelling a person from their native land; "men in exile dream of hope"; "his
deportation to a penal colony"; "the expatriation of wealthy farmers"; "the sentence was one of
transportation for life"
wordnet.princeton.edu/perl/webwn
• Transport or transportation is the movement of people and goods from one place to another. The
term is derived from the Latin trans ("across") and portare ("to carry"). ...
en.wikipedia.org/wiki/Transportation
• In geology, transportation refers to the movement of eroded debris, whether by rivers, glaciers,
wind or ocean currents and tides. Particle sizes can vary from tiny clay particles suspended in
moving water, to pebbles and boulders. ...
en.wikipedia.org/wiki/Transportation (sediment)
• The act of transporting, or the state of being transported; conveyance, often of people, goods etc;
Deportation to a penal colony; A means of conveyance
en.wiktionary.org/wiki/transportation
Cyber Security Page 27 of 35
1.
a. The act or an instance of transporting.
b. The state of being transported.
2. A means of conveyance.
3. The business of conveying passengers or goods.
4. A charge for public conveyance; fare.
5. Deportation to a penal colony.
WordNet -
transportation
noun
1. a facility consisting of the means and equipment necessary for the movement of passengers or
goods [syn: transportation system]
2. the act of moving something from one location to another
3. the sum charged for riding in a public conveyance [syn: fare]
4. the United States federal department that institutes and coordinates national transportation programs;
created in 1966 [syn: Department of Transportation]
5. the commercial enterprise of moving goods and materials
6. the act of expelling a person from their native land; "men in exile dream of hope"; "his deportation to a
penal colony"; "the expatriation of wealthy farmers"; "the sentence was one of transportation for
life" [syn: exile]
Cyber Security Page 28 of 35
http://dictionary.reference.com/browse/banking>.
http://dictionary.reference.com/browse/banking>.
<Dictionary.com http://dictionary.reference.com/browse/banking>.
Canada, Ben. “Department of Homeland Security’ State and Local Preparedness Issues.”
CRS Web Report. 5 May 2003. Congressional Research Service. 4 Feb. 2008
<http://64.233.167.104/
search?q=cache:BFpNiLizjQcJ:www.law.umaryland.edu////_05052003.pdf+home
land+security+problems&hl=en&ct=clnk&cd=59&gl=us >.
Carafano, James Jay. The Reserves and Homeland Security: Proposals, Progress,
Problems Ahead. 6 June 2002. The Center for Strategic and Budgetary
4Publications//.20020619.The_Reserves_and_H/.20020619.The_Reserves_and_H
.php>.
<Dictionary.com http://dictionary.reference.com/browse/control>.
http://dictionary.reference.com/browse/control>.
Cyber Security Page 29 of 35
Cooper, Christopher, and Robert Block. Disaster: Hurricane Katrina and the Failure of
http://dictionary.reference.com/browse/cyberspace>.
http://dictionary.reference.com/browse/cyberspace>.
http://dictionary.reference.com/browse/cyberspace>.
"cyberspace." The Free On-line Dictionary of Computing. Denis Howe. 13 Jul. 2008.
<Dictionary.com http://dictionary.reference.com/browse/cyberspace>.
<http://www.formi9.com//GTAlert_DHSRegsonSSNNo-
MatchNumbers_Aug2007.pdf>.
Security. 21
<http://www.dhs.gov/xnews/releases/ pr_1179773665704.shtm>.
“Documents: How Homeland Made Its Antiterror Grants.” Newsweek 12 June 2006: 6.
“Draft Homeland Security Strategy Adds Offensive Needs to Game Plan.” Defense Daily
nexis.com/>.
<Dictionary.com http://dictionary.reference.com/browse/finance>.
http://dictionary.reference.com/browse/finance>.
<Dictionary.com http://dictionary.reference.com/browse/finance>.
Forest, James J.F, and Joanne C Moore. Homeland Security and Terrorism. N.p.:
2007.
Greenfield, Heather. "Homeland Security cyber czar sees challenges ahead." Government
<http://www.govexec.com/dailyfed/0207/022207tdpm1.htm>.
Hall, James. Homeland Security Should Be a Goal, Not a Bureaucracy. 12 June 2002.
.htm>.
Cyber Security Page 31 of 35
“Homeland Security.” The White House. 2008. United States Government. 4 Feb. 2008
<http://www.whitehouse.gov///>.
nexis.com/>.
Hulnick, Arthur S. Keeping us Safe: Secret Intelligence and Homeland Security. N.p.:
Johnson, Jeremy, and Alex Lefebvre. "US: Impact of Northeast blackout continues to
<http://www.wsws.org/articles/2003/aug2003/blck-a20.shtml>.
Kjos, Berit. “Homeland Security and the Transformation of America.” Kjos Ministries
Larson, Eric V, and John E Peters. Preparing the US Army for Homeland Security:
Interscience, 2006.
LODER, ASJYLYN. "Utilities are still in dark over Florida blackout." St. Petersburg
Times 28
Cyber Security Page 32 of 35
<http://www.sptimes.com/2008/02/28/Business/Utilities_are_still_i.shtml>.
Nakashima, Ellen, and Steven Mufson. "Hackers Have Attacked Foreign Utilities, CIA
http://www.washingtonpost.com/wp-dyn/
content/article/2008/01/18/AR2008011803277.html>.
http://dictionary.reference.com/browse/networks>.
“Organization for Homeland Security: Issues and Options.” Terrorism Project . 21 Dec.
homelandsecurity.cfm>.
<Dictionary.com http://dictionary.reference.com/browse/protection>.
http://dictionary.reference.com/browse/protection>.
http://dictionary.reference.com/browse/protection>.
Cyber Security Page 33 of 35
<Dictionary.com http://dictionary.reference.com/browse/protection>.
Reese, Shawn. “Homeland Security Advisory System: Possible Issues for Congressional
Scardaville, Michael, and Jack Spencer. Federal Homeland Security Policy: A Nine-
<http://www.heritage.org///.cfm>.
Spadanuta, Laura. “The Privacy Problem: Homeland Security Failures.” News21 Liberty
//_privacy_problem_homeland_security>.
Spencer, Hsu, and William Branigin. “New Security Strategy Emphasizes disaster
<Dictionary.com http://dictionary.reference.com/browse/strengthen>.
http://dictionary.reference.com/browse/strengthen>.
http://dictionary.reference.com/browse/strengthen>.
Cyber Security Page 34 of 35
http://dictionary.reference.com/browse/supporting>.
http://dictionary.reference.com/browse/supporting>.
Tay, Liz. "Cyber security author discusses economics of protecting cyberspace." IT News
security-author-discusses-economics-of-protecting-cyberspace.aspx>.
<Dictionary.com http://dictionary.reference.com/browse/transportation>.
http://dictionary.reference.com/browse/transportation>.
http://dictionary.reference.com/browse/transportation>.
Ulman, Harlan. “Rethinking homeland security II: Why government isn’t working.”
2008 <http://web.lexis-nexis.com/>.
<http://www.whitehouse.gov/pcipb/cyberspace_strategy.pdf>.
passenger jets now exits, but plans to install it don’t.” Business Week 27 Mar.
nexis.com/>.