| Online-Ressource |
Verfasst von: | Porche, Isaac |
Titel: | A cyberworm that knows no boundaries |
Mitwirkende: | Sollinger, Jerry M. |
| McKay, Shawn |
Verf.angabe: | Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay |
Verlagsort: | Santa Monica |
Verlag: | RAND Corp |
Jahr: | 2011 |
Umfang: | 1 Online-Ressource (54 pages) |
Gesamttitel/Reihe: | Occasional paper ; OP-342-OSD |
Fussnoten: | "Prepared for the Office of the Secretary of Defense ; Includes bibliographical references |
ISBN: | 978-0-8330-5980-2 |
| 0-8330-5980-7 |
Reportnr.: | OP-342-OSD |
Abstract: | Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace |
| Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace |
| How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations |
| How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations |
URL: | kostenfrei: Volltext: http://www.jstor.org/stable/10.7249/op342osd |
| kostenfrei: Verlag: https://www.jstor.org/stable/10.7249/op342osd |
Datenträger: | Online-Ressource |
Sprache: | eng |
Reproduktion: | Print version: Porche, Isaac R: A Cyberworm that Knows No Boundaries. - Santa Monica: RAND Corporation, ©2011 |
Sach-SW: | COMPUTERS ; Internet ; Security |
| COMPUTERS ; Networking ; Security |
| COMPUTERS ; Security ; General |
| COMPUTERS ; Security ; Viruses |
| Computer networks ; Security measures |
| Computer viruses |
| Engineering & Applied Sciences |
| Computer Science |
K10plus-PPN: | 1008656569 |
|
|
| |
Lokale URL UB: | Zum Volltext |
978-0-8330-5980-2,0-8330-5980-7
¬A¬ cyberworm that knows no boundaries / Porche, Isaac; 2011 (Online-Ressource)
68232211