Proceedings of a workshop on deterring cyberattacks: informing strategies and developing options for U.S. policy
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Washington, D.C.
National Academies Press
[2010], ©2010
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's Web site Description based on print version record |
Beschreibung: | 1 online resource (xii, 388 pages) |
ISBN: | 0309160359 0309160863 1282885774 9780309160353 9780309160865 9781282885776 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043035104 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2010 |||| o||u| ||||||eng d | ||
020 | |a 0309160359 |9 0-309-16035-9 | ||
020 | |a 0309160863 |c electronic bk. |9 0-309-16086-3 | ||
020 | |a 1282885774 |9 1-282-88577-4 | ||
020 | |a 9780309160353 |9 978-0-309-16035-3 | ||
020 | |a 9780309160865 |c electronic bk. |9 978-0-309-16086-5 | ||
020 | |a 9781282885776 |9 978-1-282-88577-6 | ||
035 | |a (OCoLC)682564715 | ||
035 | |a (DE-599)BVBBV043035104 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 004.678 |2 22 | |
245 | 1 | 0 | |a Proceedings of a workshop on deterring cyberattacks |b informing strategies and developing options for U.S. policy |c Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies |
246 | 1 | 3 | |a Deterring cyberattacks |
264 | 1 | |a Washington, D.C. |b National Academies Press |c [2010], ©2010 | |
300 | |a 1 online resource (xii, 388 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's Web site | ||
500 | |a Description based on print version record | ||
505 | 8 | |a "Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website | |
505 | 8 | |a Introducing the economics of cybersecurity: principles and policy options / Tyler Moore -- Untangling attribution / David D. Clark and Susan Landau -- A survey of challenges in attribution / W. Earl Boebert -- Applicability of traditional deterrence concepts and theory to the cyber realm / Patrick M. Morgan -- Categorizing and understanding offensive cyber capabilities and their use / Gregory Rattray and Jason Healey -- A framework for thinking about cyber conflict and cyber deterrence with possible declaratory policies for these domains / Stephen J. Lukasik -- Pulling punches in cyberspace / Martin Libicki -- Cyber operations in international law: the use of force, collective security, self-defense, and armed conflicts / Michael N. Schmitt -- Cyber security and international agreements / Abraham D. Sofaer, David Clark, and Whitfield Diffie -- The Council of Europe Convention on Cybercrime / Michael A. Vatis -- Decision making under uncertainty / Rose McDermott -- The organization of the United States government and private sector for achieving cyber deterrence / Paul Rosenzweig -- Civil liberties and privacy implications of policies to prevent cyberattacks / Robert Gellman -- Targeting third-party collaboration / Geoff A. Cohen -- Thinking through active defense in cyberspace / Jay P. Kesan and Carol M. Hayes. Appendix A. Reprinted letter report from the Committee on Deterring Cyberattacks -- Appendix B. Workshop agenda -- Appendix C. Biosketches of authors -- Appendix D. Biosketches of Committee and staff | |
505 | 8 | |a "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. | |
505 | 8 | |a The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. | |
505 | 8 | |a Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description | |
650 | 7 | |a COMPUTERS / Web / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Intranets & Extranets |2 bisacsh | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
650 | 7 | |a Internet / Safety measures |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Cyberterrorism |z United States |x Prevention | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Internet |x Safety measures | |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Washington DC |2 gnd-content | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
710 | 2 | |a National Research Council (U.S.) |b Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy |e Sonstige |4 oth | |
710 | 2 | |a National Research Council (U.S.) |b Computer Science and Telecommunications Board |e Sonstige |4 oth | |
710 | 2 | |a National Research Council (U.S.) |b Division on Engineering and Physical Sciences |e Sonstige |4 oth | |
710 | 2 | |a National Research Council (U.S.) |b Policy and Global Affairs |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Proceedings of a workshop on deterring cyberattacks |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343953 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028459753 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343953 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343953 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175394498150400 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043035104 |
collection | ZDB-4-EBA |
contents | "Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website Introducing the economics of cybersecurity: principles and policy options / Tyler Moore -- Untangling attribution / David D. Clark and Susan Landau -- A survey of challenges in attribution / W. Earl Boebert -- Applicability of traditional deterrence concepts and theory to the cyber realm / Patrick M. Morgan -- Categorizing and understanding offensive cyber capabilities and their use / Gregory Rattray and Jason Healey -- A framework for thinking about cyber conflict and cyber deterrence with possible declaratory policies for these domains / Stephen J. Lukasik -- Pulling punches in cyberspace / Martin Libicki -- Cyber operations in international law: the use of force, collective security, self-defense, and armed conflicts / Michael N. Schmitt -- Cyber security and international agreements / Abraham D. Sofaer, David Clark, and Whitfield Diffie -- The Council of Europe Convention on Cybercrime / Michael A. Vatis -- Decision making under uncertainty / Rose McDermott -- The organization of the United States government and private sector for achieving cyber deterrence / Paul Rosenzweig -- Civil liberties and privacy implications of policies to prevent cyberattacks / Robert Gellman -- Targeting third-party collaboration / Geoff A. Cohen -- Thinking through active defense in cyberspace / Jay P. Kesan and Carol M. Hayes. Appendix A. Reprinted letter report from the Committee on Deterring Cyberattacks -- Appendix B. Workshop agenda -- Appendix C. Biosketches of authors -- Appendix D. Biosketches of Committee and staff "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description |
ctrlnum | (OCoLC)682564715 (DE-599)BVBBV043035104 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07523nmm a2200745zc 4500</leader><controlfield tag="001">BV043035104</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309160359</subfield><subfield code="9">0-309-16035-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309160863</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-309-16086-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282885774</subfield><subfield code="9">1-282-88577-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309160353</subfield><subfield code="9">978-0-309-16035-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309160865</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-309-16086-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282885776</subfield><subfield code="9">978-1-282-88577-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)682564715</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043035104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of a workshop on deterring cyberattacks</subfield><subfield code="b">informing strategies and developing options for U.S. policy</subfield><subfield code="c">Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Deterring cyberattacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, D.C.</subfield><subfield code="b">National Academies Press</subfield><subfield code="c">[2010], ©2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 388 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's Web site</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Introducing the economics of cybersecurity: principles and policy options / Tyler Moore -- Untangling attribution / David D. Clark and Susan Landau -- A survey of challenges in attribution / W. Earl Boebert -- Applicability of traditional deterrence concepts and theory to the cyber realm / Patrick M. Morgan -- Categorizing and understanding offensive cyber capabilities and their use / Gregory Rattray and Jason Healey -- A framework for thinking about cyber conflict and cyber deterrence with possible declaratory policies for these domains / Stephen J. Lukasik -- Pulling punches in cyberspace / Martin Libicki -- Cyber operations in international law: the use of force, collective security, self-defense, and armed conflicts / Michael N. Schmitt -- Cyber security and international agreements / Abraham D. Sofaer, David Clark, and Whitfield Diffie -- The Council of Europe Convention on Cybercrime / Michael A. Vatis -- Decision making under uncertainty / Rose McDermott -- The organization of the United States government and private sector for achieving cyber deterrence / Paul Rosenzweig -- Civil liberties and privacy implications of policies to prevent cyberattacks / Robert Gellman -- Targeting third-party collaboration / Geoff A. Cohen -- Thinking through active defense in cyberspace / Jay P. Kesan and Carol M. Hayes. Appendix A. Reprinted letter report from the Committee on Deterring Cyberattacks -- Appendix B. Workshop agenda -- Appendix C. Biosketches of authors -- Appendix D. Biosketches of Committee and staff</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Web / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Intranets & Extranets</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Safety measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Safety measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Washington DC</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="b">Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="b">Computer Science and Telecommunications Board</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="b">Division on Engineering and Physical Sciences</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="b">Policy and Global Affairs</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Proceedings of a workshop on deterring cyberattacks</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343953</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028459753</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343953</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343953</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift 2010 Washington DC gnd-content |
genre_facet | Konferenzschrift 2010 Washington DC |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV043035104 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:35Z |
institution | BVB |
isbn | 0309160359 0309160863 1282885774 9780309160353 9780309160865 9781282885776 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028459753 |
oclc_num | 682564715 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource (xii, 388 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | National Academies Press |
record_format | marc |
spelling | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies Deterring cyberattacks Washington, D.C. National Academies Press [2010], ©2010 1 online resource (xii, 388 pages) txt rdacontent c rdamedia cr rdacarrier "Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's Web site Description based on print version record "Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website Introducing the economics of cybersecurity: principles and policy options / Tyler Moore -- Untangling attribution / David D. Clark and Susan Landau -- A survey of challenges in attribution / W. Earl Boebert -- Applicability of traditional deterrence concepts and theory to the cyber realm / Patrick M. Morgan -- Categorizing and understanding offensive cyber capabilities and their use / Gregory Rattray and Jason Healey -- A framework for thinking about cyber conflict and cyber deterrence with possible declaratory policies for these domains / Stephen J. Lukasik -- Pulling punches in cyberspace / Martin Libicki -- Cyber operations in international law: the use of force, collective security, self-defense, and armed conflicts / Michael N. Schmitt -- Cyber security and international agreements / Abraham D. Sofaer, David Clark, and Whitfield Diffie -- The Council of Europe Convention on Cybercrime / Michael A. Vatis -- Decision making under uncertainty / Rose McDermott -- The organization of the United States government and private sector for achieving cyber deterrence / Paul Rosenzweig -- Civil liberties and privacy implications of policies to prevent cyberattacks / Robert Gellman -- Targeting third-party collaboration / Geoff A. Cohen -- Thinking through active defense in cyberspace / Jay P. Kesan and Carol M. Hayes. Appendix A. Reprinted letter report from the Committee on Deterring Cyberattacks -- Appendix B. Workshop agenda -- Appendix C. Biosketches of authors -- Appendix D. Biosketches of Committee and staff "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description COMPUTERS / Web / General bisacsh COMPUTERS / Networking / Intranets & Extranets bisacsh Cyberterrorism / Prevention fast Internet / Safety measures fast Internet / Security measures fast Cyberterrorism United States Prevention Internet Security measures Internet Safety measures Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf 1\p (DE-588)1071861417 Konferenzschrift 2010 Washington DC gnd-content USA (DE-588)4078704-7 g Information warfare (DE-588)4461975-3 s Sicherheitspolitik (DE-588)4116489-1 s 2\p DE-604 National Research Council (U.S.) Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy Sonstige oth National Research Council (U.S.) Computer Science and Telecommunications Board Sonstige oth National Research Council (U.S.) Division on Engineering and Physical Sciences Sonstige oth National Research Council (U.S.) Policy and Global Affairs Sonstige oth Erscheint auch als Druck-Ausgabe Proceedings of a workshop on deterring cyberattacks http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343953 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy "Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website Introducing the economics of cybersecurity: principles and policy options / Tyler Moore -- Untangling attribution / David D. Clark and Susan Landau -- A survey of challenges in attribution / W. Earl Boebert -- Applicability of traditional deterrence concepts and theory to the cyber realm / Patrick M. Morgan -- Categorizing and understanding offensive cyber capabilities and their use / Gregory Rattray and Jason Healey -- A framework for thinking about cyber conflict and cyber deterrence with possible declaratory policies for these domains / Stephen J. Lukasik -- Pulling punches in cyberspace / Martin Libicki -- Cyber operations in international law: the use of force, collective security, self-defense, and armed conflicts / Michael N. Schmitt -- Cyber security and international agreements / Abraham D. Sofaer, David Clark, and Whitfield Diffie -- The Council of Europe Convention on Cybercrime / Michael A. Vatis -- Decision making under uncertainty / Rose McDermott -- The organization of the United States government and private sector for achieving cyber deterrence / Paul Rosenzweig -- Civil liberties and privacy implications of policies to prevent cyberattacks / Robert Gellman -- Targeting third-party collaboration / Geoff A. Cohen -- Thinking through active defense in cyberspace / Jay P. Kesan and Carol M. Hayes. Appendix A. Reprinted letter report from the Committee on Deterring Cyberattacks -- Appendix B. Workshop agenda -- Appendix C. Biosketches of authors -- Appendix D. Biosketches of Committee and staff "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description COMPUTERS / Web / General bisacsh COMPUTERS / Networking / Intranets & Extranets bisacsh Cyberterrorism / Prevention fast Internet / Safety measures fast Internet / Security measures fast Cyberterrorism United States Prevention Internet Security measures Internet Safety measures Sicherheitspolitik (DE-588)4116489-1 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4116489-1 (DE-588)4461975-3 (DE-588)4078704-7 (DE-588)1071861417 |
title | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy |
title_alt | Deterring cyberattacks |
title_auth | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy |
title_exact_search | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy |
title_full | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies |
title_fullStr | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies |
title_full_unstemmed | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies |
title_short | Proceedings of a workshop on deterring cyberattacks |
title_sort | proceedings of a workshop on deterring cyberattacks informing strategies and developing options for u s policy |
title_sub | informing strategies and developing options for U.S. policy |
topic | COMPUTERS / Web / General bisacsh COMPUTERS / Networking / Intranets & Extranets bisacsh Cyberterrorism / Prevention fast Internet / Safety measures fast Internet / Security measures fast Cyberterrorism United States Prevention Internet Security measures Internet Safety measures Sicherheitspolitik (DE-588)4116489-1 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | COMPUTERS / Web / General COMPUTERS / Networking / Intranets & Extranets Cyberterrorism / Prevention Internet / Safety measures Internet / Security measures Cyberterrorism United States Prevention Internet Security measures Internet Safety measures Sicherheitspolitik Information warfare USA Konferenzschrift 2010 Washington DC |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=343953 |
work_keys_str_mv | AT nationalresearchcounciluscommitteeondeterringcyberattacksinformingstrategiesanddevelopingoptionsforuspolicy proceedingsofaworkshopondeterringcyberattacksinformingstrategiesanddevelopingoptionsforuspolicy AT nationalresearchcounciluscomputerscienceandtelecommunicationsboard proceedingsofaworkshopondeterringcyberattacksinformingstrategiesanddevelopingoptionsforuspolicy AT nationalresearchcouncilusdivisiononengineeringandphysicalsciences proceedingsofaworkshopondeterringcyberattacksinformingstrategiesanddevelopingoptionsforuspolicy AT nationalresearchcounciluspolicyandglobalaffairs proceedingsofaworkshopondeterringcyberattacksinformingstrategiesanddevelopingoptionsforuspolicy AT nationalresearchcounciluscommitteeondeterringcyberattacksinformingstrategiesanddevelopingoptionsforuspolicy deterringcyberattacks AT nationalresearchcounciluscomputerscienceandtelecommunicationsboard deterringcyberattacks AT nationalresearchcouncilusdivisiononengineeringandphysicalsciences deterringcyberattacks AT nationalresearchcounciluspolicyandglobalaffairs deterringcyberattacks |