A cyberworm that knows no boundaries /:
Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica :
RAND Corp.,
2011.
|
Schriftenreihe: | Occasional paper (Rand Corporation) ;
OP-342-OSD. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues. |
Beschreibung: | "Prepared for the Office of the Secretary of Defense." |
Beschreibung: | 1 online resource (54 pages) : illustrations. |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9780833059802 0833059807 1280126965 9781280126963 9786613530820 6613530824 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn779827926 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 120312s2011 caua ob 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d OCLCQ |d YDXCP |d N$T |d OCLCQ |d OCLCO |d OCLCQ |d JSTOR |d DEBSZ |d OCLCQ |d AU@ |d AWC |d E7B |d CCO |d IDEBK |d OCLCQ |d COO |d OCLCQ |d AGLDB |d MERUC |d CUS |d MOR |d PIFAG |d ZCU |d OCLCQ |d VFL |d U3W |d LOA |d LND |d ICG |d OCLCF |d STF |d JBG |d WRM |d VTS |d ICN |d INT |d VT2 |d EZ9 |d ERL |d OCLCQ |d WYU |d OCLCQ |d A6Q |d DKC |d CNTRU |d OCLCQ |d M8D |d OCLCQ |d UKCRE |d VLY |d OCLCQ |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 769016296 |a 842286045 |a 988486243 |a 991993650 |a 1008948077 |a 1037792987 |a 1038622973 |a 1055352529 |a 1081186193 |a 1083585479 |a 1115081292 |a 1153562122 |a 1162415814 |a 1228588970 | ||
020 | |a 9780833059802 |q (electronic bk.) | ||
020 | |a 0833059807 |q (electronic bk.) | ||
020 | |a 1280126965 | ||
020 | |a 9781280126963 | ||
020 | |a 9786613530820 | ||
020 | |a 6613530824 | ||
035 | |a (OCoLC)779827926 |z (OCoLC)769016296 |z (OCoLC)842286045 |z (OCoLC)988486243 |z (OCoLC)991993650 |z (OCoLC)1008948077 |z (OCoLC)1037792987 |z (OCoLC)1038622973 |z (OCoLC)1055352529 |z (OCoLC)1081186193 |z (OCoLC)1083585479 |z (OCoLC)1115081292 |z (OCoLC)1153562122 |z (OCoLC)1162415814 |z (OCoLC)1228588970 | ||
037 | |a 22573/cttpdg5 |b JSTOR | ||
043 | |a n-us--- | ||
050 | 4 | |a QA76.76.C68 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM015000 |2 bisacsh | |
072 | 7 | |a COM060040 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
088 | |a OP-342-OSD | ||
049 | |a MAIN | ||
100 | 1 | |a Porche, Isaac, |d 1968- |1 https://id.oclc.org/worldcat/entity/E39PCjKkrwh8VyrhWJRR9fhd73 |0 http://id.loc.gov/authorities/names/n2002153472 | |
245 | 1 | 2 | |a A cyberworm that knows no boundaries / |c Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay. |
260 | |a Santa Monica : |b RAND Corp., |c 2011. | ||
300 | |a 1 online resource (54 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Occasional paper ; |v OP-342-OSD | |
500 | |a "Prepared for the Office of the Secretary of Defense." | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace. | |
505 | 8 | |a How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations. | |
505 | 8 | |a Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography. | |
520 | |a Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer viruses. |0 http://id.loc.gov/authorities/subjects/sh88004897 | |
650 | 0 | |a Cyberspace |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2021002499 | |
650 | 0 | |a Cyberinfrastructure |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2021001609 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Virus informatiques. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Viruses. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast | |
650 | 7 | |a Cyberinfrastructure |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer viruses |2 fast | |
650 | 7 | |a Engineering & Applied Sciences. |2 hilcc | |
650 | 7 | |a Computer Science. |2 hilcc | |
700 | 1 | |a Sollinger, Jerry M. |0 http://id.loc.gov/authorities/names/n83157036 | |
700 | 1 | |a McKay, Shawn. |0 http://id.loc.gov/authorities/names/no2011154611 | |
758 | |i has work: |a A cyberworm that knows no boundaries (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGbk3WtXdKBrdkVtPkTwP3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Porche, Isaac R. |t A Cyberworm that Knows No Boundaries. |d Santa Monica : RAND Corporation, ©2011 |
830 | 0 | |a Occasional paper (Rand Corporation) ; |v OP-342-OSD. |0 http://id.loc.gov/authorities/names/no2004031492 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=452103 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL846009 | ||
938 | |a ebrary |b EBRY |n ebr10527282 | ||
938 | |a EBSCOhost |b EBSC |n 452103 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis23934353 | ||
938 | |a YBP Library Services |b YANK |n 7405939 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn779827926 |
---|---|
_version_ | 1816881788575809536 |
adam_text | |
any_adam_object | |
author | Porche, Isaac, 1968- |
author2 | Sollinger, Jerry M. McKay, Shawn |
author2_role | |
author2_variant | j m s jm jms s m sm |
author_GND | http://id.loc.gov/authorities/names/n2002153472 http://id.loc.gov/authorities/names/n83157036 http://id.loc.gov/authorities/names/no2011154611 |
author_facet | Porche, Isaac, 1968- Sollinger, Jerry M. McKay, Shawn |
author_role | |
author_sort | Porche, Isaac, 1968- |
author_variant | i p ip |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.C68 |
callnumber-search | QA76.76.C68 |
callnumber-sort | QA 276.76 C68 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace. How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations. Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography. |
ctrlnum | (OCoLC)779827926 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06061cam a2200877Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn779827926</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">120312s2011 caua ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JSTOR</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">AWC</subfield><subfield code="d">E7B</subfield><subfield code="d">CCO</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">CUS</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VFL</subfield><subfield code="d">U3W</subfield><subfield code="d">LOA</subfield><subfield code="d">LND</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">JBG</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">ICN</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">EZ9</subfield><subfield code="d">ERL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">DKC</subfield><subfield code="d">CNTRU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">769016296</subfield><subfield code="a">842286045</subfield><subfield code="a">988486243</subfield><subfield code="a">991993650</subfield><subfield code="a">1008948077</subfield><subfield code="a">1037792987</subfield><subfield code="a">1038622973</subfield><subfield code="a">1055352529</subfield><subfield code="a">1081186193</subfield><subfield code="a">1083585479</subfield><subfield code="a">1115081292</subfield><subfield code="a">1153562122</subfield><subfield code="a">1162415814</subfield><subfield code="a">1228588970</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833059802</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833059807</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280126965</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280126963</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613530820</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613530824</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)779827926</subfield><subfield code="z">(OCoLC)769016296</subfield><subfield code="z">(OCoLC)842286045</subfield><subfield code="z">(OCoLC)988486243</subfield><subfield code="z">(OCoLC)991993650</subfield><subfield code="z">(OCoLC)1008948077</subfield><subfield code="z">(OCoLC)1037792987</subfield><subfield code="z">(OCoLC)1038622973</subfield><subfield code="z">(OCoLC)1055352529</subfield><subfield code="z">(OCoLC)1081186193</subfield><subfield code="z">(OCoLC)1083585479</subfield><subfield code="z">(OCoLC)1115081292</subfield><subfield code="z">(OCoLC)1153562122</subfield><subfield code="z">(OCoLC)1162415814</subfield><subfield code="z">(OCoLC)1228588970</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/cttpdg5</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.C68</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM015000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="088" ind1=" " ind2=" "><subfield code="a">OP-342-OSD</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Porche, Isaac,</subfield><subfield code="d">1968-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKkrwh8VyrhWJRR9fhd73</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2002153472</subfield></datafield><datafield tag="245" ind1="1" ind2="2"><subfield code="a">A cyberworm that knows no boundaries /</subfield><subfield code="c">Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica :</subfield><subfield code="b">RAND Corp.,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (54 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Occasional paper ;</subfield><subfield code="v">OP-342-OSD</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the Office of the Secretary of Defense."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer viruses.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh88004897</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2021002499</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberinfrastructure</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2021001609</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Virus informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Viruses.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberinfrastructure</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer viruses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Engineering & Applied Sciences.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer Science.</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sollinger, Jerry M.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n83157036</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McKay, Shawn.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011154611</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">A cyberworm that knows no boundaries (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGbk3WtXdKBrdkVtPkTwP3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Porche, Isaac R.</subfield><subfield code="t">A Cyberworm that Knows No Boundaries.</subfield><subfield code="d">Santa Monica : RAND Corporation, ©2011</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Occasional paper (Rand Corporation) ;</subfield><subfield code="v">OP-342-OSD.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004031492</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=452103</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL846009</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10527282</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">452103</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis23934353</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7405939</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn779827926 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:18:17Z |
institution | BVB |
isbn | 9780833059802 0833059807 1280126965 9781280126963 9786613530820 6613530824 |
language | English |
oclc_num | 779827926 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (54 pages) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | RAND Corp., |
record_format | marc |
series | Occasional paper (Rand Corporation) ; |
series2 | Occasional paper ; |
spelling | Porche, Isaac, 1968- https://id.oclc.org/worldcat/entity/E39PCjKkrwh8VyrhWJRR9fhd73 http://id.loc.gov/authorities/names/n2002153472 A cyberworm that knows no boundaries / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay. Santa Monica : RAND Corp., 2011. 1 online resource (54 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier Occasional paper ; OP-342-OSD "Prepared for the Office of the Secretary of Defense." Includes bibliographical references. Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace. How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations. Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography. Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues. Print version record. English. Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Cyberinfrastructure Security measures. http://id.loc.gov/authorities/subjects/sh2021001609 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Virus informatiques. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Security Viruses. bisacsh Cyberspace Security measures fast Cyberinfrastructure Security measures fast Computer networks Security measures fast Computer viruses fast Engineering & Applied Sciences. hilcc Computer Science. hilcc Sollinger, Jerry M. http://id.loc.gov/authorities/names/n83157036 McKay, Shawn. http://id.loc.gov/authorities/names/no2011154611 has work: A cyberworm that knows no boundaries (Text) https://id.oclc.org/worldcat/entity/E39PCGbk3WtXdKBrdkVtPkTwP3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Porche, Isaac R. A Cyberworm that Knows No Boundaries. Santa Monica : RAND Corporation, ©2011 Occasional paper (Rand Corporation) ; OP-342-OSD. http://id.loc.gov/authorities/names/no2004031492 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=452103 Volltext |
spellingShingle | Porche, Isaac, 1968- A cyberworm that knows no boundaries / Occasional paper (Rand Corporation) ; Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace. How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations. Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography. Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Cyberinfrastructure Security measures. http://id.loc.gov/authorities/subjects/sh2021001609 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Virus informatiques. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Security Viruses. bisacsh Cyberspace Security measures fast Cyberinfrastructure Security measures fast Computer networks Security measures fast Computer viruses fast Engineering & Applied Sciences. hilcc Computer Science. hilcc |
subject_GND | http://id.loc.gov/authorities/subjects/sh88004897 http://id.loc.gov/authorities/subjects/sh2021002499 http://id.loc.gov/authorities/subjects/sh2021001609 http://id.loc.gov/authorities/subjects/sh94001277 |
title | A cyberworm that knows no boundaries / |
title_auth | A cyberworm that knows no boundaries / |
title_exact_search | A cyberworm that knows no boundaries / |
title_full | A cyberworm that knows no boundaries / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay. |
title_fullStr | A cyberworm that knows no boundaries / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay. |
title_full_unstemmed | A cyberworm that knows no boundaries / Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay. |
title_short | A cyberworm that knows no boundaries / |
title_sort | cyberworm that knows no boundaries |
topic | Computer viruses. http://id.loc.gov/authorities/subjects/sh88004897 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Cyberinfrastructure Security measures. http://id.loc.gov/authorities/subjects/sh2021001609 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Virus informatiques. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh COMPUTERS Security Viruses. bisacsh Cyberspace Security measures fast Cyberinfrastructure Security measures fast Computer networks Security measures fast Computer viruses fast Engineering & Applied Sciences. hilcc Computer Science. hilcc |
topic_facet | Computer viruses. Cyberspace Security measures. Cyberinfrastructure Security measures. Computer networks Security measures. Virus informatiques. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. COMPUTERS Security Viruses. Cyberspace Security measures Cyberinfrastructure Security measures Computer networks Security measures Computer viruses Engineering & Applied Sciences. Computer Science. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=452103 |
work_keys_str_mv | AT porcheisaac acyberwormthatknowsnoboundaries AT sollingerjerrym acyberwormthatknowsnoboundaries AT mckayshawn acyberwormthatknowsnoboundaries AT porcheisaac cyberwormthatknowsnoboundaries AT sollingerjerrym cyberwormthatknowsnoboundaries AT mckayshawn cyberwormthatknowsnoboundaries |