Securing Our Cyber Ecosystem
This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's Cyberspace Policy Review. The strategy calls for the creation of an Identity Ecosystem. The ecosystem's core is for the key components of a cyber transaction—namely the individual and organization identities, along with the identities of the infrastructure that handles transactions—to operate in a streamlined and safe manner, moving away from the culture of having different user names and passwords for each website. In its place, individuals voluntarily choose a secure privacy-enhancing credential to verify themselves for all types of online transactions from online banking, sending email, maintaining health records, or for any other personal cyber uses. The chapter goes on to describe the Comprehensive National Cyberspace Initiative (CNCI), which outlines a plan for sharing situational awareness among federal, state, and local governments, and private industry partners.
Keywords: cyber security, cyber threats, cyber ecosystem, cyber crime, public-private partnerships, National Strategy for Trusted Identities in Cyberspace, Cyberspace Policy Review, Identity Ecosystem, online transactions, Comprehensive National Cyberspace Initiative
Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.
If you think you should have access to this title, please contact your librarian.