Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

A cyberworm that knows no boundaries [electronic resource] / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay.

By: Porche, Isaac, 1968-.
Contributor(s): Sollinger, Jerry M | McKay, Shawn.
Material type: TextTextSeries: Occasional paper (Rand Corporation): OP-342-OSD.Publisher: Santa Monica : RAND Corp., 2011Description: 1 online resource (54 p.) : ill.ISBN: 9780833059802 (electronic bk.); 0833059807 (electronic bk.).Subject(s): Computer viruses | Cyberspace -- Security measures | Cyberinfrastructure -- Security measures | Computer networks -- Security measures | Computer science | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- GeneralGenre/Form: Electronic books.Additional physical formats: Print version:: A Cyberworm that Knows No BoundariesDDC classification: 005.8 Online resources: EBSCOhost
Contents:
Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace.
How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations.
Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography.
Summary: Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

"Prepared for the Office of the Secretary of Defense."

Includes bibliographical references.

Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace.

How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations.

Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography.

Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter