Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

Available items only
Record 11 of 21
Previous Record Next Record
Author Porche, Isaac, 1968-

Title A cyberworm that knows no boundaries / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay.

Imprint Santa Monica : RAND Corp., 2011.


Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
Description 1 online resource (54 pages) : illustrations.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Occasional paper ; OP-342-OSD
Occasional paper (Rand Corporation) ; OP-342-OSD.
Note "Prepared for the Office of the Secretary of Defense."
Bibliography Includes bibliographical references.
Contents Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace.
How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations.
Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography.
Summary Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.
Note Print version record.
Subject Computer viruses.
Cyberspace -- Security measures.
Cyberinfrastructure -- Security measures.
Computer networks -- Security measures.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
COMPUTERS -- Security -- Viruses.
Computer networks -- Security measures. (OCoLC)fst00872341
Computer viruses. (OCoLC)fst00872684
Engineering & Applied Sciences.
Computer Science.
Genre/Form Electronic books.
Electronic books.
Added Author Sollinger, Jerry M.
McKay, Shawn.
Other Form: Print version: Porche, Isaac R. A Cyberworm that Knows No Boundaries. Santa Monica : RAND Corporation, 2011
ISBN 9780833059802 (electronic bk.)
0833059807 (electronic bk.)

Available items only