본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

결과 내 검색

동의어 포함

목차보기

Title page 1

Contents 3

I. Introduction and summary 4

II. The cybersecurity challenge: Unsafe code and insecure architectures 6

Unsafe code 6

Zero trust challenges 6

III. Cybersecurity technology road map: Scaling resilience through safe coding and ZTAs 8

Safe coding 8

ZTAs: Creating an operational and near-term road map for rapid implementation and sustainment 11

Regional resilience districts and ZTAs 13

Financial support 14

IV. Conclusion 16

About the authors 16

Appendix: The cybersecurity challenge: Adversaries 17

China 17

Russia 17

Iran 17

North Korea 17

Criminal organizations 17

Endnotes 19