I think most organizations have an interest in key recovery, at least with respect to stored data. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
- Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
With those people, I'm very far apart, because I believe that government access to communications and stored records is valuable when done under tightly controlled conditions which protect legitimate privacy interests. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
However, leaving everything to the market is not necessarily good for society. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Generally I'm against regulation. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Some companies are offering to provide key recovery services now, but we don't have any experience with such services. That's part of the problem. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Although cyber attacks have caused billions of dollars in damage and affected the lives of millions, few if any can be characterized as acts of terrorism fraud, theft, sabotage, vandalism, and extortion - yes, but terrorism - no. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Computer worms like Code Red can be used to find potential zombies and automatically install the attack software. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
The concern is over what will happen as strong encryption becomes commonplace with all digital communications and stored data. Right now the use of encryption isn't all that widespread, but that state of affairs is expected to change rapidly. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Cyber protests have emerged in a climate where computer network attacks have become a serious and growing threat. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
New vulnerabilities are continually uncovered, and systems are configured or used in ways that make them open to attack. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
I prefer leaving things to the market as much as possible. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Everyone is a proponent of strong encryption. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
I don't have a particular recommendation other than that we base decisions on as much hard data as possible. We need to carefully look at all the options and all their ramifications in making our decisions. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
I think everybody agrees that we need encryption to protect personal, proprietary and other sensitive information. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Shortly after the September 11 terrorist attack against the United States, hackers took to the Internet to voice their rage. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Conversely, terrorists who are motivated to cause violence seem to lack the capability to cause that degree of damage in cyberspace. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
While the vast majority of hackers may be disinclined towards violence, it would only take a few to turn cyber terrorism into reality. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
The tools used to launch massive denial of service assaults, for example, have advanced command and control capabilities. - Dorothy Denning Visit FamousQuotes.com for more inspirational quotes
Vernon Jordan, Civil Rights Leader, Dies at 85