|
|
|
|
LEADER |
03116nam a2200469 u 4500 |
001 |
EB001842777 |
003 |
EBX01000000000000001006766 |
005 |
00000000000000.0 |
007 |
tu||||||||||||||||||||| |
008 |
180730 r ||| eng |
020 |
|
|
|a 1280126965
|
020 |
|
|
|a 6613530824
|
020 |
|
|
|a 9781280126963
|
020 |
|
|
|a 9786613530820
|
050 |
|
4 |
|a QA76.76.C68
|
100 |
1 |
|
|a Porche, Isaac
|
245 |
0 |
0 |
|a A cyberworm that knows no boundaries
|h Elektronische Ressource
|c Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay
|
260 |
|
|
|a Santa Monica
|b RAND Corp.
|c 2011, 2011
|
300 |
|
|
|a 54 pages
|b illustrations
|
505 |
0 |
|
|a Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace
|
505 |
0 |
|
|a Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography
|
505 |
0 |
|
|a How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations
|
505 |
0 |
|
|a Includes bibliographical references
|
653 |
|
|
|a Cyberinfrastructure / Security measures
|
653 |
|
|
|a Computer networks / Security measures
|
653 |
|
|
|a COMPUTERS / Networking / Security
|
653 |
|
|
|a COMPUTERS / Security / General
|
653 |
|
|
|a COMPUTERS / Security / Viruses
|
653 |
|
|
|a Computer viruses
|
653 |
|
|
|a COMPUTERS / Internet / Security
|
653 |
|
|
|a Cyberspace / Security measures
|
700 |
1 |
|
|a Sollinger, Jerry M.
|
700 |
1 |
|
|a McKay, Shawn
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b ZDB-39-JOA
|a JSTOR Open Access Books
|
490 |
0 |
|
|a Occasional paper
|
500 |
|
|
|a "Prepared for the Office of the Secretary of Defense."
|
776 |
|
|
|z 0833059807
|
776 |
|
|
|z 9780833059802
|
856 |
4 |
0 |
|u https://www.jstor.org/stable/10.7249/op342osd
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues
|