Publication
Sep 2011
The Obama administration has recently issued two documents outlining its intended efforts to protect the country against the many real and imagined forms of cyber attack. Both documents are clearly works in progress featuring basic principles and generally worded aspirations with very little specification of plausibly effective operational policy. At the level of computer code, there is, of course, a world of intricate operational detail to which the documents refer, and that level of detail is validly considered to be too abstruse and too sensitive for public discussion.
Download |
English (PDF, 7 pages, 93 KB) |
---|---|
Author | John Steinbruner |
Series | CISSM Working Papers |
Publisher | Center for International and Security Studies at Maryland (CISSM) |
Copyright | © 2011 Center for International and Security Studies at Maryland (CISSM) |