U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Cybersecurity Now!

NCJ Number
200809
Journal
Homeland Defense Journal Volume: 1 Issue: 2 Dated: May 2003 Pages: 18-23
Author(s)
Richard Clarke
Editor(s)
David Silverberg
Date Published
May 2003
Length
6 pages
Annotation
This article presents 10 steps that State, local, and municipal governments, private sector organizations, and the home user can implement to protect against damaging cyber attacks.
Abstract
The United States is fully dependent upon cyber systems for the functioning of the economy, the government, and critical functions; however, all of the networks are vulnerable to relatively simple cyber attacks. The Federal Government developed the National Strategy to Secure Cyberspace with the Department of Homeland Security taking the lead on implementation. The strategy outlines five major priorities and specific programs, however, cyberspace security is a complex issue and there is the need to develop more reliable computer code and systems that automatically detect and repair unauthorized activities. This article outlines 10 steps that home users, companies, and government departments can implement in their home or in their company or agency to enhance security and prevent cyber attacks. The 10 steps include: (1) install a firewall; (2) update software every week; (3) outsource IT security; (4) do not connect unclean machines to one's network; (5) scan for Wi-Fi; (6) buy IT security insurance; (7) check service provider; (8) authenticate and encrypt; (9) regularly train or teach those with access to the network how important IT security is; and (10) employ a governance over IT security with a IT security officer and IT security committee. The Federal Government’s National Strategy is a good guide for the Federal Government, but only a start. Everyone at every computer needs to be prepared in order to achieve cybersecurity.