A cyberworm that knows no boundaries

Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues

Bibliographic Details
Main Author: Porche, Isaac
Other Authors: Sollinger, Jerry M., McKay, Shawn
Format: eBook
Language:English
Published: Santa Monica RAND Corp. 2011, 2011
Series:Occasional paper
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
LEADER 03116nam a2200469 u 4500
001 EB001842777
003 EBX01000000000000001006766
005 00000000000000.0
007 tu|||||||||||||||||||||
008 180730 r ||| eng
020 |a 1280126965 
020 |a 6613530824 
020 |a 9781280126963 
020 |a 9786613530820 
050 4 |a QA76.76.C68 
100 1 |a Porche, Isaac 
245 0 0 |a A cyberworm that knows no boundaries  |h Elektronische Ressource  |c Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay 
260 |a Santa Monica  |b RAND Corp.  |c 2011, 2011 
300 |a 54 pages  |b illustrations 
505 0 |a Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace 
505 0 |a Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography 
505 0 |a How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations 
505 0 |a Includes bibliographical references 
653 |a Cyberinfrastructure / Security measures 
653 |a Computer networks / Security measures 
653 |a COMPUTERS / Networking / Security 
653 |a COMPUTERS / Security / General 
653 |a COMPUTERS / Security / Viruses 
653 |a Computer viruses 
653 |a COMPUTERS / Internet / Security 
653 |a Cyberspace / Security measures 
700 1 |a Sollinger, Jerry M. 
700 1 |a McKay, Shawn 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ZDB-39-JOA  |a JSTOR Open Access Books 
490 0 |a Occasional paper 
500 |a "Prepared for the Office of the Secretary of Defense." 
776 |z 0833059807 
776 |z 9780833059802 
856 4 0 |u https://www.jstor.org/stable/10.7249/op342osd  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues