skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 200809 Find in a Library
Title: Cybersecurity Now!
Journal: Homeland Defense Journal  Volume:1  Issue:2  Dated:May 2003  Pages:18-23
Author(s): Richard Clarke
Editor(s): David Silverberg
Date Published: May 2003
Page Count: 6
Type: Report (Study/Research)
Format: Article
Language: English
Country: United States of America
Annotation: This article presents 10 steps that State, local, and municipal governments, private sector organizations, and the home user can implement to protect against damaging cyber attacks.
Abstract: The United States is fully dependent upon cyber systems for the functioning of the economy, the government, and critical functions; however, all of the networks are vulnerable to relatively simple cyber attacks. The Federal Government developed the National Strategy to Secure Cyberspace with the Department of Homeland Security taking the lead on implementation. The strategy outlines five major priorities and specific programs, however, cyberspace security is a complex issue and there is the need to develop more reliable computer code and systems that automatically detect and repair unauthorized activities. This article outlines 10 steps that home users, companies, and government departments can implement in their home or in their company or agency to enhance security and prevent cyber attacks. The 10 steps include: (1) install a firewall; (2) update software every week; (3) outsource IT security; (4) do not connect unclean machines to one's network; (5) scan for Wi-Fi; (6) buy IT security insurance; (7) check service provider; (8) authenticate and encrypt; (9) regularly train or teach those with access to the network how important IT security is; and (10) employ a governance over IT security with a IT security officer and IT security committee. The Federal Government’s National Strategy is a good guide for the Federal Government, but only a start. Everyone at every computer needs to be prepared in order to achieve cybersecurity.
Main Term(s): Computer related crime
Index Term(s): Computer abuse; Computer hardware systems; Computer security training; Computer software; Computer viruses; Domestic terrorism; Fraud and abuse prevention measures; National security; Terrorism/Mass Violence; Terrorist weapons; Threat assessment
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.