Cargando…

Securing the U.S. defense information infrastructure : a proposed approach /

It is widely believed, and increasingly documented, that the United States is vulnerable to various types of "information warfare" attacks. Threats range from "nuisance" attacks by hackers to those potentially putting national security at risk. The latter might include attacks on...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Anderson, Robert H. (Robert Helms), 1939-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica, Calif. : RAND, 1999.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm44963525
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 000807s1999 caua ob 000 0 eng d
010 |z  99019989  
040 |a N$T  |b eng  |e pn  |c N$T  |d OCL  |d OCLCQ  |d OCLCG  |d OCLCQ  |d TUU  |d OCLCQ  |d TNF  |d NUI  |d CLU  |d OCLCQ  |d OCLCF  |d NHA  |d NLGGC  |d OCLCQ  |d DEBSZ  |d YDXCP  |d UAT  |d OCLCQ  |d AZK  |d CUS  |d OCLCQ  |d SAV  |d OCLCQ  |d QT7  |d LUE  |d VTS  |d CEF  |d AGLDB  |d OCLCQ  |d INT  |d TOF  |d OCLCQ  |d STF  |d K6U  |d CHBRC  |d UKSSU  |d LDP  |d CLU  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d INARC  |d OCLCO 
019 |a 288051459  |a 855304082  |a 961610729  |a 962724130  |a 1007393806  |a 1038586392  |a 1044504397  |a 1053011398  |a 1135381571  |a 1156868683  |a 1162011606  |a 1241848076  |a 1345653985 
020 |a 0585235074  |q (electronic bk.) 
020 |a 9780585235073  |q (electronic bk.) 
020 |z 0833027131 
020 |z 9780833027139 
029 1 |a AU@  |b 000051342996 
029 1 |a DEBBG  |b BV043071720 
029 1 |a DEBSZ  |b 422551457 
029 1 |a GBVCP  |b 800644581 
035 |a (OCoLC)44963525  |z (OCoLC)288051459  |z (OCoLC)855304082  |z (OCoLC)961610729  |z (OCoLC)962724130  |z (OCoLC)1007393806  |z (OCoLC)1038586392  |z (OCoLC)1044504397  |z (OCoLC)1053011398  |z (OCoLC)1135381571  |z (OCoLC)1156868683  |z (OCoLC)1162011606  |z (OCoLC)1241848076  |z (OCoLC)1345653985 
043 |a n-us--- 
050 4 |a UB247  |b .S425 1999eb 
072 7 |a HIS  |x 027010  |2 bisacsh 
082 0 4 |a 355.3/43  |2 21 
088 |z MR-993-OSD/NSA/DARPA 
049 |a UAMI 
245 0 0 |a Securing the U.S. defense information infrastructure :  |b a proposed approach /  |c Robert H. Anderson [and others]. 
260 |a Santa Monica, Calif. :  |b RAND,  |c 1999. 
300 |a 1 online resource (xxx, 158 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
504 |a Includes bibliographical references (pages 153-158). 
520 |a It is widely believed, and increasingly documented, that the United States is vulnerable to various types of "information warfare" attacks. Threats range from "nuisance" attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. information systems in a major regional crisis or theater war. The purpose might be to deter (or coerce) a U.S. intervention, to degrade U.S. power projection capabilities, to punish the United States or its allies, or to undermine the support of the American public for the conflict. Critical command-and-control and intelligence systems are designed to be robust and secure under attack. However, their survivability cannot be taken for granted, and they depend on a diverse, primarily civilian and commercial, information infrastructure (consisting of the Internet and the public telephone network, among other elements). As the diversity and potential seriousness of threats to the U.S. information infrastructure have become apparent, national-security planners and analysts have begun to think of ways to counter such threats--to increase the infrastructure's availability for essential functions. The authors analyze the concept of a minimum essential information infrastructure (MEII) in light of the characteristics of the national information infrastructure and the nature of the threat. They suggest that it is useful to think of the MEII as a process rather than a hardened stand-alone structure, and they provide a methodology and a tool to support the implementation of that process by military units and other organizations 
505 0 |a Introduction -- The Information warfare threat and the MEII response -- Vulnerabilities -- Responsive security techniques -- Identifying security techniques -- Distribution of research effort -- Recommendations. 
588 0 |a Print version record. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Command and control systems  |x Security measures  |z United States. 
650 0 |a Information services  |x Security measures  |z United States. 
650 6 |a Commandement militaire  |z États-Unis  |x Sécurité  |x Mesures. 
650 6 |a Services d'information  |z États-Unis  |x Sécurité  |x Mesures. 
650 7 |a HISTORY  |x Military  |x Biological & Chemical Warfare.  |2 bisacsh 
650 7 |a Command and control systems  |x Security measures  |2 fast 
650 7 |a Information services  |x Security measures  |2 fast 
651 7 |a United States  |2 fast 
700 1 |a Anderson, Robert H.  |q (Robert Helms),  |d 1939- 
776 0 8 |i Print version:  |t Securing the U.S. defense information infrastructure.  |d Santa Monica, Calif. : RAND, 1999  |z 0833027131  |w (DLC) 99019989  |w (OCoLC)40821107 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=20483  |z Texto completo 
936 |a BATCHLOAD 
938 |a EBSCOhost  |b EBSC  |n 20483 
938 |a YBP Library Services  |b YANK  |n 2315183 
938 |a Internet Archive  |b INAR  |n securingusdefens0000unse 
994 |a 92  |b IZTAP