Cargando…

A cyberworm that knows no boundaries /

Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Porche, Isaac, 1968-
Otros Autores: Sollinger, Jerry M., McKay, Shawn
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica : RAND Corp., 2011.
Colección:Occasional paper (Rand Corporation) ; OP-342-OSD.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 JSTOR_ocn779827926
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |n|---|||||
008 120312s2011 caua ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d YDXCP  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCQ  |d JSTOR  |d DEBSZ  |d OCLCQ  |d AU@  |d AWC  |d E7B  |d CCO  |d IDEBK  |d OCLCQ  |d COO  |d OCLCQ  |d AGLDB  |d MERUC  |d CUS  |d MOR  |d PIFAG  |d ZCU  |d OCLCQ  |d VFL  |d U3W  |d LOA  |d LND  |d ICG  |d OCLCF  |d STF  |d JBG  |d WRM  |d VTS  |d ICN  |d INT  |d VT2  |d EZ9  |d ERL  |d OCLCQ  |d WYU  |d OCLCQ  |d A6Q  |d DKC  |d CNTRU  |d OCLCQ  |d M8D  |d OCLCQ  |d UKCRE  |d VLY  |d OCLCQ  |d OCL  |d OCLCO  |d OCLCQ 
019 |a 769016296  |a 842286045  |a 988486243  |a 991993650  |a 1008948077  |a 1037792987  |a 1038622973  |a 1055352529  |a 1081186193  |a 1083585479  |a 1115081292  |a 1153562122  |a 1162415814  |a 1228588970 
020 |a 9780833059802  |q (electronic bk.) 
020 |a 0833059807  |q (electronic bk.) 
020 |a 1280126965 
020 |a 9781280126963 
020 |a 9786613530820 
020 |a 6613530824 
029 1 |a AU@  |b 000050897777 
029 1 |a AU@  |b 000051565870 
029 1 |a AU@  |b 000054186877 
029 1 |a CHNEW  |b 000623940 
029 1 |a DEBBG  |b BV043084091 
029 1 |a DEBBG  |b BV044162001 
029 1 |a DEBSZ  |b 372895379 
029 1 |a DEBSZ  |b 39723497X 
029 1 |a DEBSZ  |b 421418281 
029 1 |a GBVCP  |b 1008656569 
029 1 |a AU@  |b 000073101903 
035 |a (OCoLC)779827926  |z (OCoLC)769016296  |z (OCoLC)842286045  |z (OCoLC)988486243  |z (OCoLC)991993650  |z (OCoLC)1008948077  |z (OCoLC)1037792987  |z (OCoLC)1038622973  |z (OCoLC)1055352529  |z (OCoLC)1081186193  |z (OCoLC)1083585479  |z (OCoLC)1115081292  |z (OCoLC)1153562122  |z (OCoLC)1162415814  |z (OCoLC)1228588970 
037 |a 22573/cttpdg5  |b JSTOR 
043 |a n-us--- 
050 4 |a QA76.76.C68 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM015000  |2 bisacsh 
072 7 |a COM060040  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
088 |a OP-342-OSD 
049 |a UAMI 
100 1 |a Porche, Isaac,  |d 1968- 
245 1 2 |a A cyberworm that knows no boundaries /  |c Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay. 
260 |a Santa Monica :  |b RAND Corp.,  |c 2011. 
300 |a 1 online resource (54 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Occasional paper ;  |v OP-342-OSD 
500 |a "Prepared for the Office of the Secretary of Defense." 
504 |a Includes bibliographical references. 
505 0 |a Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace. 
505 8 |a How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations. 
505 8 |a Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography. 
520 |a Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues. 
588 0 |a Print version record. 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Open Access 
650 0 |a Computer viruses. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Cyberinfrastructure  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Virus informatiques. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Viruses.  |2 bisacsh 
650 7 |a Cyberspace  |x Security measures.  |2 fast  |0 (OCoLC)fst02031378 
650 7 |a Cyberinfrastructure  |x Security measures.  |2 fast  |0 (OCoLC)fst02031377 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer viruses.  |2 fast  |0 (OCoLC)fst00872684 
650 7 |a Engineering & Applied Sciences.  |2 hilcc 
650 7 |a Computer Science.  |2 hilcc 
700 1 |a Sollinger, Jerry M. 
700 1 |a McKay, Shawn. 
776 0 8 |i Print version:  |a Porche, Isaac R.  |t A Cyberworm that Knows No Boundaries.  |d Santa Monica : RAND Corporation, ©2011 
830 0 |a Occasional paper (Rand Corporation) ;  |v OP-342-OSD. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.7249/op342osd  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL846009 
938 |a ebrary  |b EBRY  |n ebr10527282 
938 |a EBSCOhost  |b EBSC  |n 452103 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis23934353 
938 |a YBP Library Services  |b YANK  |n 7405939 
994 |a 92  |b IZTAP