Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 29 of 52
Previous Record Next Record
E-Books/E-Docs
Author Porche, Isaac, 1968-

Title A cyberworm that knows no boundaries / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay.

Imprint Santa Monica : RAND Corp., 2011.

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
Description 1 online resource (54 pages) : illustrations.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Occasional paper ; OP-342-OSD
Occasional paper (Rand Corporation) ; OP-342-OSD.
Note "Prepared for the Office of the Secretary of Defense."
Bibliography Includes bibliographical references.
Contents Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace.
How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations.
Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography.
Summary Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.
Note Print version record.
Subject Computer viruses.
Cyberspace -- Security measures.
Cyberinfrastructure -- Security measures.
Computer networks -- Security measures.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
COMPUTERS -- Security -- Viruses.
Computer networks -- Security measures. (OCoLC)fst00872341
Computer viruses. (OCoLC)fst00872684
Engineering & Applied Sciences.
Computer Science.
Genre/Form Electronic books.
Electronic books.
Added Author Sollinger, Jerry M.
McKay, Shawn.
Other Form: Print version: Porche, Isaac R. A Cyberworm that Knows No Boundaries. Santa Monica : RAND Corporation, 2011
ISBN 9780833059802 (electronic bk.)
0833059807 (electronic bk.)

 
    
Available items only