9781439846636.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Cybersecurity Public Sector Threats and Responses OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Building an Enterprise-Wide Business Intelligent Video Surveillance: Continuity Program Systems and Technology Kelley Okolita Edited by Yunqian Ma and Gang Qian ISBN 978-1-4200-8864-9 ISBN 978-1-4398-1328-7 Critical Infrastructure: Homeland Security Managing an Information Security and and Emergency Preparedness, Privacy Awareness and Training Program, Second Edition Second Edition Robert Radvanovsky and Allan McDougall Rebecca Herold ISBN 978-1-4200-9527-2 ISBN 978-1-4398-1545-8 Data Protection: Governance, Mobile Device Security: A Comprehensive Risk Management, and Compliance Guide to Securing Your Information in David G. Hill a Moving World ISBN 978-1-4398-0692-0 Stephen Fried ISBN 978-1-4398-2016-2 Encyclopedia of Information Assurance Edited by Rebecca Herold and Marcus K. Rogers Secure and Resilient Software Development ISBN 978-1-4200-6620-3 Mark S. Merkow and Lakshmikanth Raghavan ISBN 978-1-4398-2696-6 The Executive MBA in Information Security John J. Trinckes, Jr. Security for Service Oriented ISBN 978-1-4398-1007-1 Architectures Bhavani Thuraisingham FISMA Principles and Best Practices: ISBN 978-1-4200-7331-7 Beyond Compliance Patrick D. Howard Security of Mobile Communications ISBN 978-1-4200-7829-9 Noureddine Boudriga ISBN 978-0-8493-7941-3 HOWTO Secure and Audit Oracle 10g and 11g Security of Self-Organizing Networks: Ron Ben-Natan MANET, WSN, WMN, VANET ISBN 978-1-4200-8412-2 Edited by Al-Sakib Khan Pathan ISBN 978-1-4398-1919-7 Information Security Management: Concepts and Practice Security Patch Management Bel G. Raggad Felicia M. Nicastro ISBN 978-1-4200-7854-1 ISBN 978-1-4398-2499-3 Information Security Policies and Security Risk Assessment Handbook: Procedures: A Practitioner’s Reference, A Complete Guide for Performing Security Second Edition Risk Assessments, Second Edition Thomas R. Peltier Douglas Landoll ISBN 978-0-8493-1958-7 ISBN 978-1-4398-2148-0 Information Security Risk Analysis, Security Strategy: From Requirements Third Edition to Reality Thomas R. Peltier Bill Stackpole and Eric Oksendahl ISBN 978-1-4398-3956-0 ISBN 978-1-4398-2733-8 Information Technology Control and Audit, Vulnerability Management Third Edition Park Foreman Sandra Senft and Frederick Gallegos ISBN 978-1-4398-0150-5 ISBN 978-1-4200-6550-3 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: [email protected] CybersecurityCybersecurity PublicPublic Sector Sector Threats Threats and and Responses Responses KimKim Andreasson Andreasson CRC Press Taylor & Francis Group CRC6000 PressBroken Sound Parkway NW, Suite 300 TaylorBoca Raton, & Francis FL 33487-2742 Group 6000 Broken Sound Parkway NW, Suite 300 Boca© 2012 Raton, by Taylor FL 33487-2742 & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business © 2012 by Taylor & Francis Group, LLC CRCNo claim Press to is original an imprint U.S. of Government Taylor & Francis works Group, an Informa business NoPrinted claim in to the original United U.S. States Government of America works on acid-free paper Version Date: 20111027 Printed in the United States of America on acid-free paper VersionInternational Date: Standard 20111027 Book Number: 978-1-4398-4663-6 (Paperback) InternationalThis book contains Standard information Book Number: obtained 978-1-4398-4663-6 from authentic (Paperback) and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume Thisresponsibility book contains for the information validity of allobtained materials from or authenticthe consequences and highly of theirregarded use. Thesources. authors Reasonable and publishers efforts have attemptedbeen made to to trace publish the copyright reliable data holders and of information, all material reproducedbut the author in this and publication publisher and cannot apologize assume to responsibilitycopyright holders for theif permission validity of toall publish materials in thisor the form consequences has not been of obtained. their use. If The any authorscopyright and material publishers has havenot been attempted acknowledged to trace pleasethe copyright write and holders let us of know all material so we may reproduced rectify in in any this future publication reprint. and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has notExcept been as acknowledged permitted under please U.S. write Copyright and let Law, us know no part so ofwe this may book rectify may in be any reprinted, future reprint. reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, TheExceptincluding Open as permitted photocopying,Access version under microfilming,of U.S. this Copyright book, available and Law, recording, no at part www.taylorfrancis.com, of or this in bookany information may be reprinted,has beenstorage made reproduced, or retrievalavailable transmit- undersystem, a Creativeted,without or utilized writtenCommons in permission any Attribution-Non form by from any theelectronic, Commercial-No publishers. mechanical, Derivatives or other 4.0 means, license. now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, withoutFor permission written topermission photocopy from or usethe materialpublishers. electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood ForDrive, permission Danvers, toMA photocopy 01923, 978-750-8400. or use material CCC electronically is a not-for-profit from this organization work, please that access provides www.copyright. licenses and comregistration (http://www.copyright.com/) for a variety of users. For or organizationscontact the Copyright that have Clearancebeen granted Center, a photocopy Inc. (CCC), license 222 by Rosewood the CCC, Drive,a separate Danvers, system MA of payment01923, 978-750-8400. has been arranged. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, aTrademark separate system Notice: of paymentProduct or has corporate been arranged. names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Cybersecurity : publicLibrary sector of Congress threats and Cataloging-in-Publication responses / editor, Kim J. Andreasson. Data p. cm. -- (Public administration and public policy) CybersecurityIncludes bibliographical : public sector references threats and and responses index. / editor, Kim J. Andreasson. ISBNp. 978-1-4398-4663-6cm. -- (Public administration (pbk.) and public policy) 1.Includes Computer bibliographical networks--Security references measures--Government and index. policy. 2. Government information--SecurityISBN 978-1-4398-4663-6 measures. (pbk.) 3. Computer crimes--Prevention. I. Andreasson, Kim J. 1. Computer networks--Security measures--Government policy. 2. Government information--Security measures. 3. Computer crimes--Prevention. I. Andreasson, Kim J.TK5105.59.C927 2011 352.3’79--dc23 2011038756 TK5105.59.C927 2011 352.3’79--dc23 2011038756 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com Visit the Taylor & Francis Web site at http://www.taylorandfrancis.comand the CRC Press Web site at http://www.crcpress.com and the CRC Press Web site at http://www.crcpress.com To those without whom this book would not have been possible. My wife, Diane, my parents, Kenth and Gullvi, and my friend, Meital, all of whom provided ongoing support. All book chapter authors and the publisher, of course, provided editorial contributions. I am grateful to all. Contents P r e fac e ix KAREN S. EVANS I n t ro d u c t I o n xiii th e e d Ito r xxvii c o n t rI b u to r b I o g r a P h I e s (I n o r d e r o f a pp e a r a n c e ) xxix c h a P t e r 1 Th e g lo ba l rI s e o f e-g ov e r n m e n t a n d It s s e c u rIt y I m P lI cat I o n s 1 JEREMY MILLARD c h a P t e r 2 U n d e rs ta n d I n g c y b e r th r e at s 27 DEBORAH L. WHEELER c h a P t e r 3 C y b e rs e c u rIt y I n e as t a s I a : Ja Pa n a n d t h e 2009 at tac ks o n s o u t h ko r e a a n d t h e u n It e d stat e s 55 MOTOHIRO TSUCHIYA c h a P t e r 4 Towa r d a g lo ba l a pp roac h to c y b e rs e c u rIt y 77 MARCO OBISO AND GARY FOWLIE c h a P t e r 5 Th e c y b e rs e c u rIt y P o lI cy c h a l l e n g e : th e ty r a n n y o f g eo g r a P h y 109 ELAINE C. KAMARCK vii viii Contents c h a P t e r 6 U.s. fe d e r a l c y b e rs e c u rIt y P o lI cy 127 DANIEL CASTRO c h a P t e r 7 E u ro P e a n c y b e rs e c u rIt y P o lI cy 159 NEIL ROBINSON c h a P t e r 8 A l o ca l c y b e rs e c u rIt y a pp roac h: th e cas e o f cata lo n I a 193 IGNACIO ALAMILLO DOMINGO AND AGUSTÍ CERRILLO-I-MARTÍNEZ c h a P t e r 9 S e c u rI n g g ov e r n m e n t tr a n s Pa r e n cy: c y b e rs e c u rIt y P o lI cy I s s u e s I n a g ov 2.0 e n v I ro n m e n t a n d b e yo n d 223 GREGORY G.