National strategy to secure cyberspace synonyms

Category:
Part of speech:
The experience or beginning of a feeling, need, or desire:
0
0
A report published in 2003 by the U.S. government to encourage companies in the private sector to improve computer security. The U.S. government was especially concerned about computer security related to critical infrastructures. Moreover, federal agencies were to set the example for “walking and talking” the best cyber-security practices. A report published in 2003 by the U.S. government to encourage companies in the private sector to improve computer security. The U.S. government was especially concerned about computer security related to critical infrastructures. Moreover, federal agencies were to set the example for “walking and talking” the best cyber-security practices. In this report, the government also said that it reserved the right to respond in an appropriate manner if the United States were to be hit with cyberwarfare. It also noted that if a cyberwar were to occur, the United States could retaliate using cyber attack tools or malicious code designed to crack and disrupt the adversary’s computer systems. Another issue raised in the report was whether the National Strategy to Secure Cyberspace can safely trust that voluntary actions would be taken by private firms, home computer users, ­universities, and government agencies to protect their networks. The report also raised the possibility of bringing in regulations to ensure best security practices. Critics against such regulations argued that they not only would interfere with innovation but also possibly harm the country’s economic competitiveness. Wilson, C. CRS Report for Congress: Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. [Online, October 17, 2003.] CRS Report Website. http://www.fas.org/irp/crs/RL32114.pdf.
0
0
A device used for computing and otherwise processing information; specif., an electronic machine which, by means of stored instructions and information, is used to perform rapid, often complex calculations, compile and correlate data, download and play audio and video communications, access the World Wide Web, send and receive e-mail, etc.; now, esp., digital computer
0
0
A report published in 2003 by the U.S. government to encourage companies in the private sector to improve computer security. The U.S. government was especially concerned about computer security related to critical infrastructures. Moreover, federal agencies were to set the example for “walking and talking” the best cyber-security practices. A report published in 2003 by the U.S. government to encourage companies in the private sector to improve computer security. The U.S. government was especially concerned about computer security related to critical infrastructures. Moreover, federal agencies were to set the example for “walking and talking” the best cyber-security practices. In this report, the government also said that it reserved the right to respond in an appropriate manner if the United States were to be hit with cyberwarfare. It also noted that if a cyberwar were to occur, the United States could retaliate using cyber attack tools or malicious code designed to crack and disrupt the adversary’s computer systems. Another issue raised in the report was whether the National Strategy to Secure Cyberspace can safely trust that voluntary actions would be taken by private firms, home computer users, ­universities, and government agencies to protect their networks. The report also raised the possibility of bringing in regulations to ensure best security practices. Critics against such regulations argued that they not only would interfere with innovation but also possibly harm the country’s economic competitiveness. Wilson, C. CRS Report for Congress: Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. [Online, October 17, 2003.] CRS Report Website. http://www.fas.org/irp/crs/RL32114.pdf.
0
0
A report published in 2003 by the U.S. government to encourage companies in the private sector to improve computer security. The U.S. government was especially concerned about computer security related to critical infrastructures. Moreover, federal agencies were to set the example for “walking and talking” the best cyber-security practices. A report published in 2003 by the U.S. government to encourage companies in the private sector to improve computer security. The U.S. government was especially concerned about computer security related to critical infrastructures. Moreover, federal agencies were to set the example for “walking and talking” the best cyber-security practices. In this report, the government also said that it reserved the right to respond in an appropriate manner if the United States were to be hit with cyberwarfare. It also noted that if a cyberwar were to occur, the United States could retaliate using cyber attack tools or malicious code designed to crack and disrupt the adversary’s computer systems. Another issue raised in the report was whether the National Strategy to Secure Cyberspace can safely trust that voluntary actions would be taken by private firms, home computer users, ­universities, and government agencies to protect their networks. The report also raised the possibility of bringing in regulations to ensure best security practices. Critics against such regulations argued that they not only would interfere with innovation but also possibly harm the country’s economic competitiveness. Wilson, C. CRS Report for Congress: Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. [Online, October 17, 2003.] CRS Report Website. http://www.fas.org/irp/crs/RL32114.pdf.
0
0
(By extension) The internet as a whole.
0
0
Alternative spelling of cyberterrorism.
0
0
A report published in 2003 by the U.S. government to encourage companies in the private sector to improve computer security. The U.S. government was especially concerned about computer security related to critical infrastructures. Moreover, federal agencies were to set the example for “walking and talking” the best cyber-security practices. A report published in 2003 by the U.S. government to encourage companies in the private sector to improve computer security. The U.S. government was especially concerned about computer security related to critical infrastructures. Moreover, federal agencies were to set the example for “walking and talking” the best cyber-security practices. In this report, the government also said that it reserved the right to respond in an appropriate manner if the United States were to be hit with cyberwarfare. It also noted that if a cyberwar were to occur, the United States could retaliate using cyber attack tools or malicious code designed to crack and disrupt the adversary’s computer systems. Another issue raised in the report was whether the National Strategy to Secure Cyberspace can safely trust that voluntary actions would be taken by private firms, home computer users, ­universities, and government agencies to protect their networks. The report also raised the possibility of bringing in regulations to ensure best security practices. Critics against such regulations argued that they not only would interfere with innovation but also possibly harm the country’s economic competitiveness. Wilson, C. CRS Report for Congress: Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. [Online, October 17, 2003.] CRS Report Website. http://www.fas.org/irp/crs/RL32114.pdf.
0
0
A larger system encompassing interconnected computer systems, as from various businesses, universities, etc.
0
0
Reliance on something in the future; hope:
0
0
Find another word for national strategy to secure cyberspace. In this page you can discover 10 synonyms, antonyms, idiomatic expressions, and related words for national strategy to secure cyberspace, like: attack, blended threats, computer, critical infrastructures, cyber apocalypse, cyberspace, cyber terrorism, cyber warfare, network and trust.