A cyberworm that knows no boundaries / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- text
- computer
- online resource
- 9780833059802
- 0833059807
- 1280126965
- 9781280126963
- 9786613530820
- 6613530824
- Computer viruses
- Cyberspace -- Security measures
- Cyberinfrastructure -- Security measures
- Computer networks -- Security measures
- Virus informatiques
- Réseaux d'ordinateurs -- Sécurité -- Mesures
- COMPUTERS -- Internet -- Security
- COMPUTERS -- Networking -- Security
- COMPUTERS -- Security -- General
- COMPUTERS -- Security -- Viruses
- Cyberspace -- Security measures
- Cyberinfrastructure -- Security measures
- Computer networks -- Security measures
- Computer viruses
- Engineering & Applied Sciences
- Computer Science
- 005.8 23
- QA76.76.C68
Item type | Home library | Collection | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
OPJGU Sonepat- Campus | E-Books EBSCO | Available |
"Prepared for the Office of the Secretary of Defense."
Includes bibliographical references.
Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace.
How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations.
Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography.
Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.
Print version record.
English.
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide
There are no comments on this title.