Featured Research

from universities, journals, and other organizations

The new civil defense: Researchers look at public's role in national cybersecurity

Date:
February 9, 2010
Source:
University of Cincinnati
Summary:
"Duck and cover!" should now be updated to "Scan and protect!" according to a new research article. Experts cite individual users as the weakest link in the nation's cybersecurity, and call for a new phase of civil defense.

University of Cincinnati researchers say the nation's cybersecurity is being threatened because an important element in establishing it is not being emphasized enough -- citizen awareness and participation.

In equating today's citizen role in cybersecurity to the Civil Defense efforts developed at the advent of the era of atomic weapons, UC Political Science faculty members Richard Harknett and James Stever argue that an active role for citizenry participation in security efforts is largely being overlooked. They make their case in a new paper published in the "Journal of Homeland Security and Emergency Management."

Currently, Washington is in a period of re-examining policy towards cybersecurity. The New York Times recently published an extensive story examining U.S. deficiencies in policy towards cyber attacks, and a new study of 600 computer and computer-security executives showed high levels of concern that cyber attacks at any time could compromise our energy and communication sectors.

Harknett and Stever argue that a three-pronged approach to cybersecurity is necessary: the ideas of coordination within government agencies and also between government and business interests surface in almost every discussion on the topic, but the third leg -- engagement with the public about the role they can play in cybersecurity -- rarely gets mentioned.

"The general population must be engaged as active security providers, not simply beneficiaries of security policy, because their practices often create the threats to which government must respond," write Harknett and Stever. As an example, they cite the hijacking last July of up to 50,000 computers for use in a botnet denial-of-service attack on Web sites operated by the U.S. and South Korean governments.

These kinds of threats are the weakest link in our national cybersecurity, they say. The potential is there through cyber attack to, as an example, target the nation's electric grid or financial transaction records

"Any awareness campaign that remains seated in only self-interest (i.e. if you do not protect yourselves bad things will happen to you) will not establish this critical third leg of the cybersecurity triad," Harknett and Stever write. Computer users need to be made to understand that, in the networked age of the Internet, the implications of their not adhering to safe computer practices regarding passwords, security software and downloading protocols can open a door for those with much more malevolent goals than just infecting individual computers with viruses or spyware.

What Harknett and Stever are recommending is a widespread effort to remold how people view cyberspace. The current view of cyberspace as a private concern needs to be replaced with an attitude that cyberspace is a public good. As they put it, "the key reorientation of any cyber awareness plan must hinge on the notion of active participation in enhancing national security as a civic duty."

The goal would be changes in behavior by all American computer users. The effort should go so far as making secure computing practices part of what is taught to young computer users in the nation's schools.

As an example of what needs to be done, Harknett and Stever cite the onset of Civil Defense planning in the 1950s. The key difference, though, is that Americans in the 1950s were motivated to participate because they instantly understood the perils posed by nuclear weapons. People today don't yet understand the downside risks that could come from a cyber attack.

"The ubiquity of computer technology throughout the civilian population will require full societal engagement if the national objective is a secure cyberspace. As the digital environment grows in scale and scope, so too will the need for a cyber civic culture to emerge to manage it," Harknett and Steve write. "Ironically, because the citizenry is less conscious of the cyber than the nuclear threat (as national security threat), a much greater degree of civic mobilization and understanding will be required to face this 21st Century challenge."


Story Source:

The above story is based on materials provided by University of Cincinnati. Note: Materials may be edited for content and length.


Journal Reference:

  1. Harknett et al. The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen. Journal of Homeland Security and Emergency Management, 2009; 6 (1): DOI: 10.2202/1547-7355.1649

Cite This Page:

University of Cincinnati. "The new civil defense: Researchers look at public's role in national cybersecurity." ScienceDaily. ScienceDaily, 9 February 2010. <www.sciencedaily.com/releases/2010/02/100201102020.htm>.
University of Cincinnati. (2010, February 9). The new civil defense: Researchers look at public's role in national cybersecurity. ScienceDaily. Retrieved August 23, 2014 from www.sciencedaily.com/releases/2010/02/100201102020.htm
University of Cincinnati. "The new civil defense: Researchers look at public's role in national cybersecurity." ScienceDaily. www.sciencedaily.com/releases/2010/02/100201102020.htm (accessed August 23, 2014).

Share This




More Science & Society News

Saturday, August 23, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Endangered Red Wolves Face Uncertain Future

Endangered Red Wolves Face Uncertain Future

AP (Aug. 22, 2014) A federal judge temporarily banned coyote hunting to save endangered red wolves, but local hunters say that the wolf preservation program does more harm than good. Meanwhile federal officials are reviewing its wolf program in North Carolina. (Aug. 22) Video provided by AP
Powered by NewsLook.com
Bank of America's $17 Bln Settlement

Bank of America's $17 Bln Settlement

Reuters - Business Video Online (Aug. 21, 2014) Bank of America's settlement is by far the largest amount paid by big banks facing mortgage securities probes. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com
Former TSA X-Ray Scanners Easily Tricked To Miss Weapons

Former TSA X-Ray Scanners Easily Tricked To Miss Weapons

Newsy (Aug. 21, 2014) Researchers found the scanners could be duped simply by placing a weapon off to the side of the body or encasing it under a plastic shield. Video provided by Newsy
Powered by NewsLook.com
Cadavers, a Teen, and a Medical School Dream

Cadavers, a Teen, and a Medical School Dream

AP (Aug. 21, 2014) Contains graphic content. He's only 17. But Johntrell Bowles has wanted to be a doctor from a young age, despite the odds against him. He was recently the youngest participant in a cadaver program at the Indiana University NW medical school. (Aug. 21) Video provided by AP
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins