Protecting critical infrastructures against cyber-attack:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Oxford Univ. Pr.
2003
|
Ausgabe: | 1. publ. |
Schriftenreihe: | Adelphi papers
359 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 98 S. |
ISBN: | 0198530161 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV017616939 | ||
003 | DE-604 | ||
007 | t | ||
008 | 031103s2003 |||| 00||| eng d | ||
020 | |a 0198530161 |9 0-19-853016-1 | ||
035 | |a (OCoLC)53181317 | ||
035 | |a (DE-599)BVBBV017616939 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-188 |a DE-19 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Lukasik, Stephen J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Protecting critical infrastructures against cyber-attack |c Stephen J. Lukasik, Seymour E. Goodman and David W. Longhurst |
250 | |a 1. publ. | ||
264 | 1 | |a Oxford |b Oxford Univ. Pr. |c 2003 | |
300 | |a 98 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Adelphi papers |v 359 | |
650 | 7 | |a Bescherming |2 gtt | |
650 | 7 | |a Criminalité informatique |2 ram | |
650 | 7 | |a Informatiesystemen |2 gtt | |
650 | 7 | |a Kwetsbaarheid |2 gtt | |
650 | 7 | |a Systèmes informatiques - Mesures de sûreté |2 ram | |
650 | 7 | |a Terrorisme - Lutte contre |2 ram | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Information superhighway |x Security measures | |
650 | 4 | |a Infrastructure (Economics) | |
650 | 0 | 7 | |a Virusinaktivierung |0 (DE-588)4205282-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Neue Medien |0 (DE-588)4196910-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Infrastruktur |0 (DE-588)4026944-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | 1 | |a Virusinaktivierung |0 (DE-588)4205282-8 |D s |
689 | 1 | 2 | |a Infrastruktur |0 (DE-588)4026944-9 |D s |
689 | 1 | 3 | |a Neue Medien |0 (DE-588)4196910-8 |D s |
689 | 1 | |5 DE-188 | |
700 | 1 | |a Goodman, Seymour E. |e Verfasser |4 aut | |
700 | 1 | |a Longhurst, David W. |e Verfasser |4 aut | |
830 | 0 | |a Adelphi papers |v 359 |w (DE-604)BV002542379 |9 359 | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010598928&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
Datensatz im Suchindex
_version_ | 1805072908746227712 |
---|---|
adam_text |
PROTECTING CRITICAL INFRASTRUCTURES AGAINST CYBER-ATTACK STEPHEN J.
LUKASIK, SEYMOUR E. GOODMAN AND DAVID W. LONGHURST ADELPHI PAPER 359
CONTENTS 5 INTRODUCTION 7 CHAPTER 1 THE VULNERABILITIES OF NATIONAL
INFRASTRUCTURE * INFRASTRUCTURE INTERDEPENDENCIES Y * INFRASTRUCTURE
FAILURES AND INFRASTRUCTURE ATTACKS 9 * MODELSFOR INFORMATION ATTACKS ON
INFRASTRUCTURE 11 15 CHAPTER 2 STRATEGIE DEFENCE OPTIONS * PREVENTING AN
ATTACK 17 * THWARTING AN ATTACK 18 * LIMITING DAMAGE DURING A SUCCESSFUL
ATTACK 19 * RECONSTITUTING AN ATTACK 20 * IMPROVING THE DEFENDER'S
PERFORMANCE 21 25 CHAPTER 3 IMPLEMENTING NATIONAL STRATEGIES: ACTIONS
AND ACTORS 43 CHAPTER 4 SELECTING A STRATEGY 49 CHAPTER 5 STRATEGIE
OPTIONS * THE UNITED STATES 49 * THE UNITED KINGDOM 54 59 CHAPTER 6
PROTECTING INFRASTRUCTURES IN THE US ANDUK * THE UNITED STATES 59 * THE
UNITED KINGDOM 66 73 CHAPTER 7 THE BROADER APPLICABILITY OF THE
STRATEGIE FRAMEWORK * APPLYING THE STRATEGIE FRAMEWORK GENERICALLY 75 *
SWEDEN AS AN EXAMPLE 78 83 CONCLUSION |
any_adam_object | 1 |
author | Lukasik, Stephen J. Goodman, Seymour E. Longhurst, David W. |
author_facet | Lukasik, Stephen J. Goodman, Seymour E. Longhurst, David W. |
author_role | aut aut aut |
author_sort | Lukasik, Stephen J. |
author_variant | s j l sj sjl s e g se seg d w l dw dwl |
building | Verbundindex |
bvnumber | BV017616939 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)53181317 (DE-599)BVBBV017616939 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV017616939</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">031103s2003 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0198530161</subfield><subfield code="9">0-19-853016-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53181317</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017616939</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lukasik, Stephen J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting critical infrastructures against cyber-attack</subfield><subfield code="c">Stephen J. Lukasik, Seymour E. Goodman and David W. Longhurst</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Oxford Univ. Pr.</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">98 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Adelphi papers</subfield><subfield code="v">359</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Bescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminalité informatique</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatiesystemen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kwetsbaarheid</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorisme - Lutte contre</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information superhighway</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Infrastructure (Economics)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Virusinaktivierung</subfield><subfield code="0">(DE-588)4205282-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Neue Medien</subfield><subfield code="0">(DE-588)4196910-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Infrastruktur</subfield><subfield code="0">(DE-588)4026944-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Virusinaktivierung</subfield><subfield code="0">(DE-588)4205282-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Infrastruktur</subfield><subfield code="0">(DE-588)4026944-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Neue Medien</subfield><subfield code="0">(DE-588)4196910-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Goodman, Seymour E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Longhurst, David W.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Adelphi papers</subfield><subfield code="v">359</subfield><subfield code="w">(DE-604)BV002542379</subfield><subfield code="9">359</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010598928&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield></record></collection> |
id | DE-604.BV017616939 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T05:01:12Z |
institution | BVB |
isbn | 0198530161 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010598928 |
oclc_num | 53181317 |
open_access_boolean | |
owner | DE-12 DE-188 DE-19 DE-BY-UBM |
owner_facet | DE-12 DE-188 DE-19 DE-BY-UBM |
physical | 98 S. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Oxford Univ. Pr. |
record_format | marc |
series | Adelphi papers |
series2 | Adelphi papers |
spelling | Lukasik, Stephen J. Verfasser aut Protecting critical infrastructures against cyber-attack Stephen J. Lukasik, Seymour E. Goodman and David W. Longhurst 1. publ. Oxford Oxford Univ. Pr. 2003 98 S. txt rdacontent n rdamedia nc rdacarrier Adelphi papers 359 Bescherming gtt Criminalité informatique ram Informatiesystemen gtt Kwetsbaarheid gtt Systèmes informatiques - Mesures de sûreté ram Terrorisme - Lutte contre ram Terrorismus Computer networks Security measures Computer security Cyberterrorism Prevention Information superhighway Security measures Infrastructure (Economics) Virusinaktivierung (DE-588)4205282-8 gnd rswk-swf Neue Medien (DE-588)4196910-8 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Infrastruktur (DE-588)4026944-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 s Rechnernetz (DE-588)4070085-9 s DE-604 Virusinaktivierung (DE-588)4205282-8 s Infrastruktur (DE-588)4026944-9 s Neue Medien (DE-588)4196910-8 s DE-188 Goodman, Seymour E. Verfasser aut Longhurst, David W. Verfasser aut Adelphi papers 359 (DE-604)BV002542379 359 GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010598928&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lukasik, Stephen J. Goodman, Seymour E. Longhurst, David W. Protecting critical infrastructures against cyber-attack Adelphi papers Bescherming gtt Criminalité informatique ram Informatiesystemen gtt Kwetsbaarheid gtt Systèmes informatiques - Mesures de sûreté ram Terrorisme - Lutte contre ram Terrorismus Computer networks Security measures Computer security Cyberterrorism Prevention Information superhighway Security measures Infrastructure (Economics) Virusinaktivierung (DE-588)4205282-8 gnd Neue Medien (DE-588)4196910-8 gnd Datenschutz (DE-588)4011134-9 gnd Rechnernetz (DE-588)4070085-9 gnd Infrastruktur (DE-588)4026944-9 gnd |
subject_GND | (DE-588)4205282-8 (DE-588)4196910-8 (DE-588)4011134-9 (DE-588)4070085-9 (DE-588)4026944-9 |
title | Protecting critical infrastructures against cyber-attack |
title_auth | Protecting critical infrastructures against cyber-attack |
title_exact_search | Protecting critical infrastructures against cyber-attack |
title_full | Protecting critical infrastructures against cyber-attack Stephen J. Lukasik, Seymour E. Goodman and David W. Longhurst |
title_fullStr | Protecting critical infrastructures against cyber-attack Stephen J. Lukasik, Seymour E. Goodman and David W. Longhurst |
title_full_unstemmed | Protecting critical infrastructures against cyber-attack Stephen J. Lukasik, Seymour E. Goodman and David W. Longhurst |
title_short | Protecting critical infrastructures against cyber-attack |
title_sort | protecting critical infrastructures against cyber attack |
topic | Bescherming gtt Criminalité informatique ram Informatiesystemen gtt Kwetsbaarheid gtt Systèmes informatiques - Mesures de sûreté ram Terrorisme - Lutte contre ram Terrorismus Computer networks Security measures Computer security Cyberterrorism Prevention Information superhighway Security measures Infrastructure (Economics) Virusinaktivierung (DE-588)4205282-8 gnd Neue Medien (DE-588)4196910-8 gnd Datenschutz (DE-588)4011134-9 gnd Rechnernetz (DE-588)4070085-9 gnd Infrastruktur (DE-588)4026944-9 gnd |
topic_facet | Bescherming Criminalité informatique Informatiesystemen Kwetsbaarheid Systèmes informatiques - Mesures de sûreté Terrorisme - Lutte contre Terrorismus Computer networks Security measures Computer security Cyberterrorism Prevention Information superhighway Security measures Infrastructure (Economics) Virusinaktivierung Neue Medien Datenschutz Rechnernetz Infrastruktur |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010598928&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV002542379 |
work_keys_str_mv | AT lukasikstephenj protectingcriticalinfrastructuresagainstcyberattack AT goodmanseymoure protectingcriticalinfrastructuresagainstcyberattack AT longhurstdavidw protectingcriticalinfrastructuresagainstcyberattack |