03698nam 2200625 a 450 991022015730332120200520144314.01-280-12696-59786613530820(CKB)2550000000079776(EBL)846009(OCoLC)779827926(SSID)ssj0000949351(PQKBManifestationID)11485482(PQKBTitleCode)TC0000949351(PQKBWorkID)10996488(PQKB)11168830(OCoLC)769016296(MiAaPQ)EBC846009(WaSeSS)Ind00071306(EXLCZ)99255000000007977620120213d2011 ua 0engur|n|---|||||txtccrA cyberworm that knows no boundaries /Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay1st ed.Santa Monica, Calif. Rand Corp.20111 online resource (54 p.)Occasional paper"Prepared for the Office of the Secretary of Defense. Approved for public release; distribution unlimited."0-8330-5980-7 Includes bibliographical references.Cover; Copyright; Preface; Contents; Figures and Tables; Figures; Tables; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace; How to Identify an Attack; What Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and ReviewsIntersectional LimitationsConclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; Future Work; A.1. Cyberspace Today; Appendixes; Appendix A: The Cyberspace Domain; A.2. Cyberspace and Social NetworkingAppendix B: WormsB.1. Conficker Worm Progression; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; D.1. Federal Cyber Legislation; BibliographyIt has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.Occasional paper (Rand Corporation)Computer securityUnited StatesComputer networksSecurity measuresUnited StatesComputer securityComputer networksSecurity measures005.8Porche Isaac1968-942259Sollinger Jerry M973387McKay Shawn1039943MiAaPQMiAaPQMiAaPQBOOK9910220157303321A cyberworm that knows no boundaries2462424UNINA