Critical infrastructure protection [[electronic resource] ] : OMB leadership needed to strengthen agency planning efforts to protect federal cyber assets : report to congressional requesters |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2009] |
Descrizione fisica | 1 online resource (i, 51 pages) |
Soggetto topico |
Computer security - United States - Planning
Computer networks - Security measures - United States - Planning Cyberterrorism - United States - Prevention National security - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Critical infrastructure protection |
Record Nr. | UNINA-9910697099003321 |
[Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber incident response : bridging the gap between cybersecurity and emergency management : joint hearing before the Subcommittee on Emergency Preparedness, Response and Communications and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, first session, October 30, 2013 |
Pubbl/distr/stampa | Washington : , : U.S. Government Printing Office, , 2014 |
Descrizione fisica | 1 online resource (iv, 72 pages) : illustration |
Soggetto topico |
Computer networks - Security measures - United States - Planning
Cyberspace - Security measures - United States - Planning Cyberterrorism - United States - Prevention Emergency management - United States Intergovernmental cooperation - United States |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber Incident Response |
Record Nr. | UNINA-9910708253603321 |
Washington : , : U.S. Government Printing Office, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber preparedness and response at the local level : field hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, April 7, 2016 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2016 |
Descrizione fisica | 1 online resource (iii, 31 pages) |
Soggetto topico |
Computer security - United States - States
Computer networks - Security measures - United States - Planning Cyberspace - Security measures - United States - States - Planning Cyberspace - Security measures - Texas - Planning Computer crimes - United States - Prevention |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber preparedness and response at the local level |
Record Nr. | UNINA-9910707830803321 |
Washington : , : U.S. Government Publishing Office, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
DOE modernization : legislation addressing cybersecurity and emergency response : hearing before the Subcommittee on Energy of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, March 14, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2018 |
Descrizione fisica | 1 online resource (v, 181 pages) |
Soggetto topico |
Cyberinfrastructure - Security measures - United States
Cyberspace - Security measures - United States - Planning Computer networks - Security measures - United States - Planning Emergency management - United States |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | DOE modernization |
Record Nr. | UNINA-9910711789603321 |
Washington : , : U.S. Government Publishing Office, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The other quiet professionals : lessons for future cyber forces from the evolution of special forces / / Christopher Paul, Isaac R. Porche III, Elliot Axelband |
Autore | Paul Christopher <1971-> |
Pubbl/distr/stampa | Santa Monica, California : , : RAND Corporation, , 2014 |
Descrizione fisica | 1 online resource (140 p.) |
Disciplina | 355.3/43 |
Soggetto topico |
Cyberspace - Security measures - United States - Planning
Computer networks - Security measures - United States - Planning Cyberterrorism - United States - Prevention - Planning Information warfare - United States |
ISBN |
0-8330-8800-9
0-8330-8802-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Preface; Contents; Figure and Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Purpose; Organization of This Monograph; CHAPTER TWO Special Operations Forces Before U.S. Special Operations Command; The Long and Storied History of Commandos; Vietnam and Its Aftermath; U.S. Special Operations Forces Limp into the 1980's; The Catalytic Failure at Desert One, 1980; Reform and Reconstitution in the Early 1980's; Problems Remain: Grenada, 1983; Further Congressional Pushes and Defense Resistance; Congress Takes Decisive Action, 1986
CHAPTER THREE The Transition to and Evolution of U.S. Special Operations Command Further Legislation to Force Implementation; The Bureaucratic Burdens of Administering New Authorities; Evolution After the Establishment of U.S. Special Operations Command; The Authorities of U.S. Special Operations Command; CHAPTER FOUR Cyber Forces and U.S. Cyber Command; The Lexicon; Cyber Force Roles; The Need for Uniformed Cyber Forces; Integration into Full-Spectrum Operations; Authority to Operate in Cyberspace; Deployability; Current Cyber Force Structure; U.S. Army Cyber Forces; U.S. Cyber Command CHAPTER FIVE Confirming the Analogy: How Alike Are Pre-U.S. Special Operations Command Forces and Contemporary Cyber Forces? Common Features; Personnel; Doctrine; Organization; Development Strategy; Institutionalization of Training; Adequacy Relative to Potential Demand; Similarities; Personnel; Relationship with and to Conventional Forces; "Precarious Values"; Applicability Across the Spectrum of Conflict; Acquisition Needs; Calls for Reform; Differences; Personnel; Historical Tradition; Salient Historical Events; Core Essence; Lessons from the Analogy CHAPTER SIX Lessons for U.S. Cyber Forces from U.S. Special Operations Command Acquisitions Problems with Current Acquisition Processes; Cyber Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Needs; U.S. Special Operations Command Rapid Acquisition Processes; Culture and Other Keys to Success; Quick Recognition and Validation; The Ability to Contract to Develop Products Quickly; The Ability to Equip Selected Warfighters Rather Than Field Capabilities to the Entire Force; Track Record of U.S. Special Operations Command's Rapid Acquisition Programs How Cyber Acquisition Could Be Modeled After the U.S. Special Operations Command Rapid Acquisition Approach Summary; CHAPTER SEVEN Conclusions and Recommendations; Recommendations for the U.S. Department of Defense; Empower USCYBERCOM as a Joint Home for the Cyber Community.; Find Acquisition Solutions for Needed Cyber Tools; Recommendations for the U.S. Army; Support USCYBERCOM as a Capstone Coordinator of and Organizational Home for the Entire Cyber Force; Make U.S. Army Cyber Command for the Army's Cyber Forces What USSOCOM Is for All SOF Recognize the Precarious Value of Cyber Forces and Support Them Accordingly |
Record Nr. | UNINA-9910220091503321 |
Paul Christopher <1971-> | ||
Santa Monica, California : , : RAND Corporation, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Redefining information warfare boundaries for an Army in a wireless world / / Isaac R. Porche III [et al.] |
Autore | Porche Isaac <1968-> |
Pubbl/distr/stampa | Santa Monica, Calif., : RAND, [2013] |
Descrizione fisica | 1 online resource (240 p.) |
Disciplina | 355.3/43 |
Altri autori (Persone) | PaulChristopher <1971-> |
Collana | Rand Corporation monograph series |
Soggetto topico |
Information warfare - United States
Military doctrine - United States Computer networks - Security measures - United States - Planning Cyberspace - Security measures - United States |
ISBN | 0-8330-7886-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Background; The Army's Role in Cyberspace; What Is Cyberspace?; Environments; Domains; Information Environment; Cyberspace Defined; Cyber-Electromagnetic/Cyber-Electronic Operations; Purpose; Approach; How This Monograph Is Organized; CHAPTER TWO The Information Environment and Information Warfare; The Information Environment; The U.S. Department of Defense View of the Information Environment; Components of the Information Environment; Information Warfare
A Definition Debate over the Term; Functional Areas That Compose Information Warfare; The Terms Cyber-Electronic and Cyber-Electromagnetic; CHAPTER THREE The Problem with Information Operations; How Information Operations Are Defined; How Information Operations Are Organized in the Army; Problems with the Current Definition; Misunderstandings and Disagreements; Problems with the Current Organization; Lack of Common Vision for Information Operations; Vision 1: Base Case; Vision 2: Information Operations as a Coordinating and Integrating Function Vision 3: Information Operations as Command-and-Control Warfare Vision 4: Information Operations as Influence Operations; Vision 5: Information Operations as Advocacy; Vision 6: Information Operations as Everything; Information Operations as a Moving Target; CHAPTER FOUR Redefining and Reorganizing Information Operations; Key Questions and Answers to Guide a Redefinition of Information Operations; Discussion on the Role of IO; Confusion over the Terms Operation and Integration; The Need for Advocacy; What Is Being Integrated, Advocated, or Executed?; Key Capabilities Need to Be Included Avoid Long Lists of Capabilities to Define IO Arguments Can Be Made That IO Is Everything; Discussion of Possible Ends to Be Sought; The List of Relevant Capabilities Remains Too Long to Be Useful; Pros and Cons of a Narrow Set of Ends; Information Tasks as Potential Ends; Influence as an End; Command-and-Control Warfare; A Proposed Definition of Information Operations; Proposed Definition; IIO and ITO: Compartmentalizing the Definition; CHAPTER FIVE How Electronic Warfare Overlaps with Other Areas; Analysis of Electronic Warfare and Electromagnetic Spectrum Operations Relationship of Intelligence Capabilities to Electronic Warfare and Cyberspace Operations Signals Intelligence, Electronic Warfare, and Electromagnetic Spectrum Operations; Electronic Warfare and Signals Intelligence; Relationship Between Electronic Warfare and Cyber Operations; Approach: A System Consideration of Cyber Operations; Electronic Warfare as Fielded Today; Chapter Summary and Conclusions; CHAPTER SIX Overlaps Between Public Affairs and Military Information Support Operations; Comparing Public Affairs and Military Information Support Operations; Public Affairs Military Information Support Operations |
Record Nr. | UNINA-9910220101503321 |
Porche Isaac <1968-> | ||
Santa Monica, Calif., : RAND, [2013] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|