Dorothy Denning

Public Servant

United States

1945 - Present

12 quotes

Showing 10 of 12 quotes

If we take as given that critical infrastructures are vulnerable to a cyber terrorist attack, then the question becomes whether there are actors with the capability and motivation to carry out such an operation.
Dorothy Denning
With those people, I'm very far apart, because I believe that government access to communications and stored records is valuable when done under tightly controlled conditions which protect legitimate privacy interests.
Dorothy Denning
I think most organizations have an interest in key recovery, at least with respect to stored data.
Dorothy Denning
Generally I'm against regulation.
Dorothy Denning
I favor strategies that encourage industry to include some sort of key recovery capability in their systems which would also address user requirements for access.
Dorothy Denning
While many hackers have the knowledge, skills, and tools to attack computer systems, they generally lack the motivation to cause violence or severe economic or social harm.
Dorothy Denning
Systems are complex, so controlling an attack and achieving a desired level of damage may be harder than using physical weapons.
Dorothy Denning
Cyber terrorism could also become more attractive as the real and virtual worlds become more closely coupled, with automobiles, appliances, and other devices attached to the Internet.
Dorothy Denning
We have never really had absolute privacy with our records or our electronic communications - government agencies have always been able to gain access with appropriate court orders.
Dorothy Denning
Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal.
Dorothy Denning