Cargando…

Cyber attacks : protecting national infrastructure /

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community aroun...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Amoroso, Edward G.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Butterworth-Heinemann, �2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn677828684
003 OCoLC
005 20231117044449.0
006 m o d
007 cr cn|||||||||
008 101104s2011 mau ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d N$T  |d YDXCP  |d EBLCP  |d IUL  |d MHW  |d OCLCQ  |d B24X7  |d UMI  |d COO  |d DEBSZ  |d OCLCQ  |d VLB  |d CDX  |d OCLCQ  |d OCLCO  |d E7B  |d REDDC  |d OCLCF  |d TEFOD  |d OCL  |d TEFOD  |d OCLCQ  |d Z5A  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d D6H  |d CEF  |d XOS  |d INT  |d OCLCQ  |d WYU  |d OCLCQ  |d AUD  |d LEAUB  |d OL$  |d OCLCQ  |d BRF  |d LVT  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 690111229  |a 698587683  |a 759841781  |a 769366144  |a 796020326  |a 1065103958  |a 1128108228  |a 1229171749 
020 |a 9780123849175  |q (electronic bk.) 
020 |a 0123849179  |q (electronic bk.) 
020 |a 9780123849182  |q (electronic bk.) 
020 |a 0123849187  |q (electronic bk.) 
035 |a (OCoLC)677828684  |z (OCoLC)690111229  |z (OCoLC)698587683  |z (OCoLC)759841781  |z (OCoLC)769366144  |z (OCoLC)796020326  |z (OCoLC)1065103958  |z (OCoLC)1128108228  |z (OCoLC)1229171749 
043 |a n-us--- 
050 4 |a HV6773.2  |b .A47 2011 
072 7 |a POL  |x 037000  |2 bisacsh 
082 0 4 |a 363.325/90046780973  |2 22 
100 1 |a Amoroso, Edward G. 
245 1 0 |a Cyber attacks :  |b protecting national infrastructure /  |c Edward Amoroso. 
260 |a Burlington, MA :  |b Butterworth-Heinemann,  |c �2011. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. * Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT & T. 
505 0 |a Chapter 1: Introduction -- Chapter 2: Deception -- Chapter 3: Separation -- Chapter 4: Diversity -- Chapter 5: Commonality -- Chapter 6: Depth -- Chapter 7: Discretion -- Chapter 8: Collection -- Chapter 9: Correlation -- Chapter 10: Awareness -- Chapter 11: Response -- Appendix: Sample National Infrastructure Protection Requirements. 
505 0 |a Introduction -- Deception -- Separation -- Diversity -- Commonality -- Depth -- Discretion -- Collection -- Correlation -- Awareness -- Response. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
650 0 |a Cyberterrorism  |z United States  |x Prevention. 
650 0 |a Computer security  |z United States. 
650 0 |a National security  |z United States. 
650 6 |a S�ecurit�e informatique  |0 (CaQQLa)201-0061152  |z �Etats-Unis.  |0 (CaQQLa)201-0407727 
650 7 |a POLITICAL SCIENCE  |x Political Freedom & Security  |x Terrorism.  |2 bisacsh 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cyberterrorism  |x Prevention  |2 fast  |0 (OCoLC)fst01905567 
650 7 |a National security  |2 fast  |0 (OCoLC)fst01033711 
651 7 |a United States  |2 fast  |0 (OCoLC)fst01204155 
776 0 8 |i Print version:  |a Amoroso, Edward G.  |t Cyber attacks.  |d Burlington, MA : Butterworth-Heinemann, �2011  |z 9780123849175  |w (DLC) 2010040626  |w (OCoLC)670211398 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780123849175  |z Texto completo