Securing the U.S. defense information infrastructure: a proposed approach
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Santa Monica, Calif.
RAND
1999
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references (pages 153-158) It is widely believed, and increasingly documented, that the United States is vulnerable to various types of "information warfare" attacks. Threats range from "nuisance" attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. information systems in a major regional crisis or theater war. The purpose might be to deter (or coerce) a U.S. intervention, to degrade U.S. power projection capabilities, to punish the United States or its allies, or to undermine the support of the American public for the conflict. Critical command-and-control and intelligence systems are designed to be robust and secure under attack. However, their survivability cannot be taken for granted, and they depend on a diverse, primarily civilian and commercial, information infrastructure (consisting of the Internet and the public telephone network, among other elements). As the diversity and potential seriousness of threats to the U.S. information infrastructure have become apparent, national-security planners and analysts have begun to think of ways to counter such threats--to increase the infrastructure's availability for essential functions. The authors analyze the concept of a minimum essential information infrastructure (MEII) in light of the characteristics of the national information infrastructure and the nature of the threat. They suggest that it is useful to think of the MEII as a process rather than a hardened stand-alone structure, and they provide a methodology and a tool to support the implementation of that process by military units and other organizations Introduction -- The Information warfare threat and the MEII response -- Vulnerabilities -- Responsive security techniques -- Identifying security techniques -- Distribution of research effort -- Recommendations |
Beschreibung: | 1 Online-Ressource (xxx, 158 pages) |
ISBN: | 0585235074 0833027131 9780585235073 9780833027139 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043071720 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s1999 |||| o||u| ||||||eng d | ||
020 | |a 0585235074 |9 0-585-23507-4 | ||
020 | |a 0833027131 |9 0-8330-2713-1 | ||
020 | |a 9780585235073 |9 978-0-585-23507-3 | ||
020 | |a 9780833027139 |9 978-0-8330-2713-9 | ||
035 | |a (OCoLC)44963525 | ||
035 | |a (DE-599)BVBBV043071720 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 355.3/43 |2 21 | |
245 | 1 | 0 | |a Securing the U.S. defense information infrastructure |b a proposed approach |c Robert H. Anderson [and others] |
264 | 1 | |a Santa Monica, Calif. |b RAND |c 1999 | |
300 | |a 1 Online-Ressource (xxx, 158 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 153-158) | ||
500 | |a It is widely believed, and increasingly documented, that the United States is vulnerable to various types of "information warfare" attacks. Threats range from "nuisance" attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. information systems in a major regional crisis or theater war. The purpose might be to deter (or coerce) a U.S. intervention, to degrade U.S. power projection capabilities, to punish the United States or its allies, or to undermine the support of the American public for the conflict. Critical command-and-control and intelligence systems are designed to be robust and secure under attack. However, their survivability cannot be taken for granted, and they depend on a diverse, primarily civilian and commercial, information infrastructure (consisting of the Internet and the public telephone network, among other elements). As the diversity and potential seriousness of threats to the U.S. information infrastructure have become apparent, national-security planners and analysts have begun to think of ways to counter such threats--to increase the infrastructure's availability for essential functions. The authors analyze the concept of a minimum essential information infrastructure (MEII) in light of the characteristics of the national information infrastructure and the nature of the threat. They suggest that it is useful to think of the MEII as a process rather than a hardened stand-alone structure, and they provide a methodology and a tool to support the implementation of that process by military units and other organizations | ||
500 | |a Introduction -- The Information warfare threat and the MEII response -- Vulnerabilities -- Responsive security techniques -- Identifying security techniques -- Distribution of research effort -- Recommendations | ||
650 | 7 | |a HISTORY / Military / Biological & Chemical Warfare |2 bisacsh | |
650 | 7 | |a Command and control systems / Security measures |2 fast | |
650 | 7 | |a Information services / Security measures |2 fast | |
650 | 4 | |a Command and control systems |x Security measures |z United States | |
650 | 4 | |a Information services |x Security measures |z United States | |
650 | 0 | 7 | |a Verteidigung |0 (DE-588)4063254-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Verteidigung |0 (DE-588)4063254-4 |D s |
689 | 0 | 2 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 3 | |a Sicherheitsmaßnahme |0 (DE-588)4181167-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Anderson, Robert H. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=20483 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028495912 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=20483 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=20483 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175455663685633 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043071720 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)44963525 (DE-599)BVBBV043071720 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04339nmm a2200577zc 4500</leader><controlfield tag="001">BV043071720</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s1999 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0585235074</subfield><subfield code="9">0-585-23507-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833027131</subfield><subfield code="9">0-8330-2713-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585235073</subfield><subfield code="9">978-0-585-23507-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833027139</subfield><subfield code="9">978-0-8330-2713-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)44963525</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043071720</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">21</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the U.S. defense information infrastructure</subfield><subfield code="b">a proposed approach</subfield><subfield code="c">Robert H. Anderson [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, Calif.</subfield><subfield code="b">RAND</subfield><subfield code="c">1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxx, 158 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 153-158)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">It is widely believed, and increasingly documented, that the United States is vulnerable to various types of "information warfare" attacks. Threats range from "nuisance" attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. information systems in a major regional crisis or theater war. The purpose might be to deter (or coerce) a U.S. intervention, to degrade U.S. power projection capabilities, to punish the United States or its allies, or to undermine the support of the American public for the conflict. Critical command-and-control and intelligence systems are designed to be robust and secure under attack. However, their survivability cannot be taken for granted, and they depend on a diverse, primarily civilian and commercial, information infrastructure (consisting of the Internet and the public telephone network, among other elements). As the diversity and potential seriousness of threats to the U.S. information infrastructure have become apparent, national-security planners and analysts have begun to think of ways to counter such threats--to increase the infrastructure's availability for essential functions. The authors analyze the concept of a minimum essential information infrastructure (MEII) in light of the characteristics of the national information infrastructure and the nature of the threat. They suggest that it is useful to think of the MEII as a process rather than a hardened stand-alone structure, and they provide a methodology and a tool to support the implementation of that process by military units and other organizations</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- The Information warfare threat and the MEII response -- Vulnerabilities -- Responsive security techniques -- Identifying security techniques -- Distribution of research effort -- Recommendations</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Military / Biological & Chemical Warfare</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Command and control systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information services / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Command and control systems</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information services</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteidigung</subfield><subfield code="0">(DE-588)4063254-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Verteidigung</subfield><subfield code="0">(DE-588)4063254-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anderson, Robert H.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=20483</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028495912</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=20483</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=20483</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV043071720 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:34Z |
institution | BVB |
isbn | 0585235074 0833027131 9780585235073 9780833027139 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028495912 |
oclc_num | 44963525 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxx, 158 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | RAND |
record_format | marc |
spelling | Securing the U.S. defense information infrastructure a proposed approach Robert H. Anderson [and others] Santa Monica, Calif. RAND 1999 1 Online-Ressource (xxx, 158 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (pages 153-158) It is widely believed, and increasingly documented, that the United States is vulnerable to various types of "information warfare" attacks. Threats range from "nuisance" attacks by hackers to those potentially putting national security at risk. The latter might include attacks on essential U.S. information systems in a major regional crisis or theater war. The purpose might be to deter (or coerce) a U.S. intervention, to degrade U.S. power projection capabilities, to punish the United States or its allies, or to undermine the support of the American public for the conflict. Critical command-and-control and intelligence systems are designed to be robust and secure under attack. However, their survivability cannot be taken for granted, and they depend on a diverse, primarily civilian and commercial, information infrastructure (consisting of the Internet and the public telephone network, among other elements). As the diversity and potential seriousness of threats to the U.S. information infrastructure have become apparent, national-security planners and analysts have begun to think of ways to counter such threats--to increase the infrastructure's availability for essential functions. The authors analyze the concept of a minimum essential information infrastructure (MEII) in light of the characteristics of the national information infrastructure and the nature of the threat. They suggest that it is useful to think of the MEII as a process rather than a hardened stand-alone structure, and they provide a methodology and a tool to support the implementation of that process by military units and other organizations Introduction -- The Information warfare threat and the MEII response -- Vulnerabilities -- Responsive security techniques -- Identifying security techniques -- Distribution of research effort -- Recommendations HISTORY / Military / Biological & Chemical Warfare bisacsh Command and control systems / Security measures fast Information services / Security measures fast Command and control systems Security measures United States Information services Security measures United States Verteidigung (DE-588)4063254-4 gnd rswk-swf Sicherheitsmaßnahme (DE-588)4181167-7 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Verteidigung (DE-588)4063254-4 s Informationssystem (DE-588)4072806-7 s Sicherheitsmaßnahme (DE-588)4181167-7 s 1\p DE-604 Anderson, Robert H. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=20483 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Securing the U.S. defense information infrastructure a proposed approach HISTORY / Military / Biological & Chemical Warfare bisacsh Command and control systems / Security measures fast Information services / Security measures fast Command and control systems Security measures United States Information services Security measures United States Verteidigung (DE-588)4063254-4 gnd Sicherheitsmaßnahme (DE-588)4181167-7 gnd Informationssystem (DE-588)4072806-7 gnd |
subject_GND | (DE-588)4063254-4 (DE-588)4181167-7 (DE-588)4072806-7 (DE-588)4078704-7 |
title | Securing the U.S. defense information infrastructure a proposed approach |
title_auth | Securing the U.S. defense information infrastructure a proposed approach |
title_exact_search | Securing the U.S. defense information infrastructure a proposed approach |
title_full | Securing the U.S. defense information infrastructure a proposed approach Robert H. Anderson [and others] |
title_fullStr | Securing the U.S. defense information infrastructure a proposed approach Robert H. Anderson [and others] |
title_full_unstemmed | Securing the U.S. defense information infrastructure a proposed approach Robert H. Anderson [and others] |
title_short | Securing the U.S. defense information infrastructure |
title_sort | securing the u s defense information infrastructure a proposed approach |
title_sub | a proposed approach |
topic | HISTORY / Military / Biological & Chemical Warfare bisacsh Command and control systems / Security measures fast Information services / Security measures fast Command and control systems Security measures United States Information services Security measures United States Verteidigung (DE-588)4063254-4 gnd Sicherheitsmaßnahme (DE-588)4181167-7 gnd Informationssystem (DE-588)4072806-7 gnd |
topic_facet | HISTORY / Military / Biological & Chemical Warfare Command and control systems / Security measures Information services / Security measures Command and control systems Security measures United States Information services Security measures United States Verteidigung Sicherheitsmaßnahme Informationssystem USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=20483 |
work_keys_str_mv | AT andersonroberth securingtheusdefenseinformationinfrastructureaproposedapproach |