top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Critical infrastructure protection [[electronic resource] ] : federal efforts require a more coordinated and comprehensive approach for protecting information systems
Critical infrastructure protection [[electronic resource] ] : federal efforts require a more coordinated and comprehensive approach for protecting information systems
Pubbl/distr/stampa [Washington, D.C.] : , : U.S. General Accounting Office, , [2002]
Soggetto topico Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States
Computer networks - Security measures - United States
Information warfare - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Critical Infrastructure Protection
Record Nr. UNINA-9910693799303321
[Washington, D.C.] : , : U.S. General Accounting Office, , [2002]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-threats, information warfare, and critical infrastructure protection [[electronic resource] ] : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman
Cyber-threats, information warfare, and critical infrastructure protection [[electronic resource] ] : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman
Autore Cordesman Anthony H
Pubbl/distr/stampa Westport, Conn., : Praeger, 2002
Descrizione fisica 1 online resource (192 p.)
Disciplina 005.8
Altri autori (Persone) CordesmanJustin G
Soggetto topico Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States
Computer networks - Security measures - United States
Information warfare - United States
Soggetto genere / forma Electronic books.
ISBN 1-280-37386-5
9786610373864
0-313-01619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910455736503321
Cordesman Anthony H  
Westport, Conn., : Praeger, 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-threats, information warfare, and critical infrastructure protection [[electronic resource] ] : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman
Cyber-threats, information warfare, and critical infrastructure protection [[electronic resource] ] : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman
Autore Cordesman Anthony H
Pubbl/distr/stampa Westport, Conn., : Praeger, 2002
Descrizione fisica 1 online resource (192 p.)
Disciplina 005.8
Altri autori (Persone) CordesmanJustin G
Soggetto topico Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States
Computer networks - Security measures - United States
Information warfare - United States
ISBN 1-280-37386-5
9786610373864
0-313-01619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910780259203321
Cordesman Anthony H  
Westport, Conn., : Praeger, 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman
Cyber-threats, information warfare, and critical infrastructure protection : defending the U.S. homeland / / Anthony H. Cordesman with Justin G. Cordesman
Autore Cordesman Anthony H
Edizione [1st ed.]
Pubbl/distr/stampa Westport, Conn. : , : Praeger, , 2001
Descrizione fisica 1 online resource (192 p.)
Disciplina 005.8
Altri autori (Persone) CordesmanJustin G
Soggetto topico Electronic data processing - Security measures - United States
Telecommunication - Defense measures - United States
Computer networks - Security measures - United States
Information warfare - United States
ISBN 979-84-00-63650-9
1-280-37386-5
9786610373864
0-313-01619-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Cyber-threats, Information Warfare, and Critical Infrastructure Protection -- Contents -- Acknowledgments -- Chapter 1 The Changing Nature of Critical Infrastructure Protection -- THE PROBLEM OF EVOLVING TECHNOLOGY -- THE UNCERTAIN BALANCE OF RISKS AND NON-RISKS IN CYBER-ATTACKS -- The Disconnect between Cyber-defense and Cyber-offense -- The Lack of Credible Risk and Vulnerability Assessments -- GOVERNMENTAL AND PRIVATE SECTOR EFFORTS TO RESPOND -- Chapter 2 Threat Assessment -- THE PRESIDENT'S COMMISSION ON CRITICAL INFRASTRUCTURE PROTECTION CHARACTERIZATION OF THE THREAT -- THE NATIONAL INFRASTRUCTURE PROTECTION CENTER'S (NIPC) VIEW OF THE THREAT -- INTELLIGENCE COMMUNITY ASSESSMENTS OF THE THREAT -- CIA Testimony on the Threat -- National Intelligence Council's Estimate of the Threat -- Incidents of "Cyber-warfare": The Kosovo Crisis -- Serbia's Role in Information Warfare -- NATO's Role in Information Warfare -- Is Information Warfare and Retaliation Legal and Worth Its Costs? -- Lower-Level Incidents of "Cyber-warfare" -- Moonlight Maze -- Solar Sunrise -- Rome Labs Incident -- THE COMPUTER SECURITY INSTITUTE'S SURVEY OF THE THREAT -- COMPUTER EMERGENCY RESPONSE TEAM'S (CERT) ASSESSMENT OF THREAT -- CHALLENGES IN IMPROVING THE ASSESSMENT OF THE THREAT -- Chapter 3 Evolving U.S. Policy and Response -- THE BEGINNINGS: THE COMPUTER SECURITY ACT AND CLINGER-COHEN ACT -- THE FEDERAL GOVERNMENT REDEFINES CRITICAL INFRASTRUCTURE AND AGENCY RESPONSIBILITIES -- Executive Order 13010 -- The President's Commission on Critical Infrastructure Protection -- Presidential Decision Directive-63 (PDD-63) -- Lead Agencies for Sector Liaison -- Lead Agencies for Special Functions -- A New Structure for Interagency Coordination -- National Infrastructure Protection Center (NIPC) -- Information Sharing and Analysis Center (ISAC).
National Infrastructure Assurance Council -- National Infrastructure Assurance Plan -- Studies and Research -- Cooperation with the Private and Civil Sectors -- Annual Report on Implementation -- NATIONAL PLAN FOR INFORMATION SYSTEMS PROTECTION -- National Plan for Information Systems Protection, Version One -- GAO Comments on the National Plan for Information Systems Protection -- Oplan 3600 -- THE SUCCESS OF THE FEDERAL GOVERNMENT EFFORT TO DATE -- Chapter 4 Analyzing Federal Critical Infrastructure Programs by Department and Agency -- THE NATIONAL PLAN FOR INFORMATION SYSTEMS ESTIMATE -- THE OMB ANALYSIS -- ANNUAL REPORT TO CONGRESS ON COMBATING TERRORISM -- Government-wide Spending on CIP -- EFFORTS BY FEDERAL AGENCIES -- Department of Agriculture -- Department of Commerce -- Critical Infrastructure Assurance Office -- Department of Energy -- Environmental Protection Agency and GAO Audits -- Health and Human Services -- Department of Interior -- Department of Justice -- NASA -- GAO Assessments of NASA Information Security -- NATIONAL SCIENCE FOUNDATION -- NATIONAL SECURITY COMMUNITY -- The Role of the Department of Defense -- Patterns of Attack and Response -- Major DoD Cyber-defense Programs -- GAO Critiques of DoD Efforts: The 1996 Study -- The GAO's 1999 Recommendations -- DoD Progress in Addressing Security Weaknesses -- Cyber and Information Warfare and the Role of the Intelligence Community -- Total Spending on National Security Activity -- Department of State -- Department of Transportation -- Department of Treasury -- Department of Veterans Affairs -- Chapter 5 Assessments of Effectiveness -- INDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF OCTOBER 6, 1999 -- Management Recommendations Within Brock's Testimony.
INDEPENDENT U.S. GOVERNMENT EFFORTS TO ASSESS RISK, COST, AND BENEFITS: GAO TESTIMONY OF MARCH 29, 2000 -- Weaknesses in Controls -- Raise Awareness -- Implement Software Patches -- Routinely Use Automated Tools to Monitor Security -- Identify and Propagate Pockets of Excellence -- Focus on the Most Common Vulnerabilities First -- Enforce a Strong Management Approach -- PRELIMINARY ANALYSIS OF GAO FINDINGS -- OTHER EFFORTS TO ASSESS RISK, COST, AND BENEFITS -- TECHNICAL RISKS, TESTS, AND EVALUATIONS OF IW PROGRAMS -- Chapter 6 Role of State and Local Governments -- Chapter 7 Role of Private Industry -- Chapter 8 Lessons from Other Nations: International Vulnerability -- Chapter 9 Conclusions and Recommendations -- Notes -- About the Authors.
Record Nr. UNINA-9910815472703321
Cordesman Anthony H  
Westport, Conn. : , : Praeger, , 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui