Statement of responsibility: Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay
ISBN: 0833059807, 9780833059802
Print version record.
Includes bibliographical references.
"Prepared for the Office of the Secretary of Defense."
1 online resource (54 pages) : illustrations.
Occasional paper ; OP-342-OSD
Cyberinfrastructure Security measures.; COMPUTERS Security Viruses.; Computer networks Security measures.; Cyberspace Security measures.; COMPUTERS Internet Security.; COMPUTERS Security General.; Computer viruses.; COMPUTERS Networking Security.
Occasional paper (Rand Corporation) ; OP-342-OSD.
JSTOR Books at JSTOR Open Access
- Figures and Tables
- A.1. Cyberspace Today
- A.2. Cyberspace and Social Networking
- B.1. Conficker Worm Progression
- 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews
- 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure
- 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace
- D.1. Federal Cyber Legislation
- A Cyberworm That Knows No Boundaries
- The Difficulty of Defending Cyberspace.
- How to Identify an AttackWhat Was Needed to Carry Out the Attack
- The Implications of Stuxnet and Similar Worms
- Implications of the Success of Stuxnet
- What Is Needed to Defend Against Stuxnet and Similar Worms
- How Organizational Boundaries Hinder Efforts to Mount an Effective Defence
- Intragovernmental Limitations
- Intersectional Limitations
- The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing
- Not All Attacks Can Be Prevented
- The Best Defense Includes an Offense
- Current Organizational Boundaries Hinder Identification and Mitigation
- Future WorkAppendixes
- Appendix A: The Cyberspace Domain
- Appendix B: Worms
- Appendix C: Einstein Intrusion Detection and Protection
- Appendix D: Federal Cyber Legislation