Navigation überspringen
Universitätsbibliothek Heidelberg
Standort: ---
Exemplare: ---

+ Andere Auflagen/Ausgaben
 Online-Ressource
Verfasst von:Porche, Isaac   i
Titel:A cyberworm that knows no boundaries
Mitwirkende:Sollinger, Jerry M.   i
 McKay, Shawn   i
Verf.angabe:Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay
Verlagsort:Santa Monica
Verlag:RAND Corp
Jahr:2011
Umfang:1 Online-Ressource (54 pages)
Gesamttitel/Reihe:Occasional paper ; OP-342-OSD
Fussnoten:"Prepared for the Office of the Secretary of Defense ; Includes bibliographical references
ISBN:978-0-8330-5980-2
 0-8330-5980-7
Reportnr.:OP-342-OSD
Abstract:Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace
 Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace
 How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations
 How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations
URL:kostenfrei: Volltext: http://www.jstor.org/stable/10.7249/op342osd
 kostenfrei: Verlag: https://www.jstor.org/stable/10.7249/op342osd
Datenträger:Online-Ressource
Sprache:eng
Reproduktion:Print version: Porche, Isaac R: A Cyberworm that Knows No Boundaries. - Santa Monica: RAND Corporation, ©2011
Sach-SW:COMPUTERS ; Internet ; Security
 COMPUTERS ; Networking ; Security
 COMPUTERS ; Security ; General
 COMPUTERS ; Security ; Viruses
 Computer networks ; Security measures
 Computer viruses
 Engineering & Applied Sciences
 Computer Science
K10plus-PPN:1008656569
 
 
Lokale URL UB: Zum Volltext

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/68232211   QR-Code
zum Seitenanfang