Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 39 of 517
Previous Record Next Record
Print Material
Author Porche, Isaac, 1968-

Title A cyberworm that knows no boundaries / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay.

Imprint Santa Monica : RAND Corp., 2011.

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
Description 1 online resource (54 pages) : illustrations.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Occasional paper ; OP-342-OSD
Occasional paper (Rand Corporation) ; OP-342-OSD.
Note "Prepared for the Office of the Secretary of Defense."
Bibliography Includes bibliographical references.
Contents Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace.
How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations.
Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography.
Summary Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.
Note Print version record.
Language English.
Subject Computer viruses.
Cyberspace -- Security measures.
Cyberinfrastructure -- Security measures.
Computer networks -- Security measures.
Virus informatiques.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
COMPUTERS -- Security -- Viruses.
Cyberspace -- Security measures
Cyberinfrastructure -- Security measures
Computer networks -- Security measures
Computer viruses
Engineering & Applied Sciences.
Computer Science.
Added Author Sollinger, Jerry M.
McKay, Shawn.
Other Form: Print version: Porche, Isaac R. A Cyberworm that Knows No Boundaries. Santa Monica : RAND Corporation, ©2011
ISBN 9780833059802 (electronic bk.)
0833059807 (electronic bk.)
1280126965
9781280126963
9786613530820
6613530824
Standard No. AU@ 000050897777
AU@ 000051565870
AU@ 000054186877
CHNEW 000623940
DEBBG BV043084091
DEBBG BV044162001
DEBSZ 372895379
DEBSZ 39723497X
DEBSZ 421418281
GBVCP 1008656569
AU@ 000073101903
AU@ 000075798843

 
    
Available items only