Cyber-threats, information warfare, and critical infrastructure protection [[electronic resource] ] : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman |
Autore | Cordesman Anthony H |
Pubbl/distr/stampa | Westport, Conn., : Praeger, 2002 |
Descrizione fisica | 1 online resource (192 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | CordesmanJustin G |
Soggetto topico |
Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States Computer networks - Security measures - United States Information warfare - United States |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-37386-5
9786610373864 0-313-01619-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910455736503321 |
Cordesman Anthony H | ||
Westport, Conn., : Praeger, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-threats, information warfare, and critical infrastructure protection [[electronic resource] ] : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman |
Autore | Cordesman Anthony H |
Pubbl/distr/stampa | Westport, Conn., : Praeger, 2002 |
Descrizione fisica | 1 online resource (192 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | CordesmanJustin G |
Soggetto topico |
Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States Computer networks - Security measures - United States Information warfare - United States |
ISBN |
1-280-37386-5
9786610373864 0-313-01619-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910780259203321 |
Cordesman Anthony H | ||
Westport, Conn., : Praeger, 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman |
Autore | Cordesman Anthony H |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Westport, Conn. : , : Praeger, , 2001 |
Descrizione fisica | 1 online resource (192 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | CordesmanJustin G |
Soggetto topico |
Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States Computer networks - Security measures - United States Information warfare - United States |
ISBN |
979-84-00-63650-9
1-280-37386-5 9786610373864 0-313-01619-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Cyber-threats, Information Warfare, and Critical Infrastructure Protection -- Contents -- Acknowledgments -- Chapter 1 The Changing Nature of Critical Infrastructure Protection -- THE PROBLEM OF EVOLVING TECHNOLOGY -- THE UNCERTAIN BALANCE OF RISKS AND NON-RISKS IN CYBER-ATTACKS -- The Disconnect between Cyber-defense and Cyber-offense -- The Lack of Credible Risk and Vulnerability Assessments -- GOVERNMENTAL AND PRIVATE SECTOR EFFORTS TO RESPOND -- Chapter 2 Threat Assessment -- THE PRESIDENT'S COMMISSION ON CRITICAL INFRASTRUCTURE PROTECTION CHARACTERIZATION OF THE THREAT -- THE NATIONAL INFRASTRUCTURE PROTECTION CENTER'S (NIPC) VIEW OF THE THREAT -- INTELLIGENCE COMMUNITY ASSESSMENTS OF THE THREAT -- CIA Testimony on the Threat -- National Intelligence Council's Estimate of the Threat -- Incidents of "Cyber-warfare": The Kosovo Crisis -- Serbia's Role in Information Warfare -- NATO's Role in Information Warfare -- Is Information Warfare and Retaliation Legal and Worth Its Costs? -- Lower-Level Incidents of "Cyber-warfare" -- Moonlight Maze -- Solar Sunrise -- Rome Labs Incident -- THE COMPUTER SECURITY INSTITUTE'S SURVEY OF THE THREAT -- COMPUTER EMERGENCY RESPONSE TEAM'S (CERT) ASSESSMENT OF THREAT -- CHALLENGES IN IMPROVING THE ASSESSMENT OF THE THREAT -- Chapter 3 Evolving U.S. Policy and Response -- THE BEGINNINGS: THE COMPUTER SECURITY ACT AND CLINGER-COHEN ACT -- THE FEDERAL GOVERNMENT REDEFINES CRITICAL INFRASTRUCTURE AND AGENCY RESPONSIBILITIES -- Executive Order 13010 -- The President's Commission on Critical Infrastructure Protection -- Presidential Decision Directive-63 (PDD-63) -- Lead Agencies for Sector Liaison -- Lead Agencies for Special Functions -- A New Structure for Interagency Coordination -- National Infrastructure Protection Center (NIPC) -- Information Sharing and Analysis Center (ISAC).
National Infrastructure Assurance Council -- National Infrastructure Assurance Plan -- Studies and Research -- Cooperation with the Private and Civil Sectors -- Annual Report on Implementation -- NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION -- National Plan for Information Systems Protection, Version One -- GAO Comments on the National Plan for Information Systems Protection -- Oplan 3600 -- THE SUCCESS OF THE FEDERAL GOVERNMENT EFFORT TO DATE -- Chapter 4 Analyzing Federal Critical Infrastructure Programs by Department and Agency -- THE NATIONAL PLAN FOR INFORMATION SYSTEMS ESTIMATE -- THE OMB ANALYSIS -- ANNUAL REPORT TO CONGRESS ON COMBATING TERRORISM -- Government-wide Spending on CIP -- EFFORTS BY FEDERAL AGENCIES -- Department of Agriculture -- Department of Commerce -- Critical Infrastructure Assurance Office -- Department of Energy -- Environmental Protection Agency and GAO Audits -- Health and Human Services -- Department of Interior -- Department of Justice -- NASA -- GAO Assessments of NASA Information Security -- NATIONAL SCIENCE FOUNDATION -- NATIONAL SECURITY COMMUNITY -- The Role of the Department of Defense -- Patterns of Attack and Response -- Major DoD Cyber-defense Programs -- GAO Critiques of DoD Efforts: The 1996 Study -- The GAO's 1999 Recommendations -- DoD Progress in Addressing Security Weaknesses -- Cyber and Information Warfare and the Role of the Intelligence Community -- Total Spending on National Security Activity -- Department of State -- Department of Transportation -- Department of Treasury -- Department of Veterans Affairs -- Chapter 5 Assessments of Effectiveness -- INDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF OCTOBER 6, 1999 -- Management Recommendations Within Brock's Testimony. INDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF MARCH 29, 2000 -- Weaknesses in Controls -- Raise Awareness -- Implement Software Patches -- Routinely Use Automated Tools to Monitor Security -- Identify and Propagate Pockets of Excellence -- Focus on the Most Common Vulnerabilities First -- Enforce a Strong Management Approach -- PRELIMINARY ANALYSIS OF GAO FINDINGS -- OTHER EFFORTS TO ASSESS RISK, COST, AND BENEFITS -- TECHNICAL RISKS, TESTS, AND EVALUATIONS OF IW PROGRAMS -- Chapter 6 Role of State and Local Governments -- Chapter 7 Role of Private Industry -- Chapter 8 Lessons from Other Nations: International Vulnerability -- Chapter 9 Conclusions and Recommendations -- Notes -- About the Authors. |
Record Nr. | UNINA-9910815472703321 |
Cordesman Anthony H | ||
Westport, Conn. : , : Praeger, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|