Narrow your search
Listing 1 - 5 of 5
Sort by

Book
A cyberworm that knows no boundaries
Authors: --- ---
ISBN: 1280126965 9786613530820 0833059807 9780833059802 9781280126963 6613530824 Year: 2011 Publisher: Santa Monica RAND Corp.

Loading...
Export citation

Choose an application

Bookmark

Abstract

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.


Book
Cyberdeterrence and cyberwar
Authors: ---
ISBN: 9780833047342 1282398539 9786612398537 0833048759 0833047345 9780833048752 9781282398535 6612398531 Year: 2009 Publisher: Santa Monica, CA RAND

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.


Book
Redefining information warfare boundaries for an Army in a wireless world
Authors: ---
ISBN: 0833078860 0833059122 9780833078865 9780833078841 0833078844 9780833078858 0833078852 9780833059123 Year: 2013 Publisher: Santa Monica, CA

Loading...
Export citation

Choose an application

Bookmark

Abstract

The U.S. Army is studying ways to apply its cyber power and is reconsidering doctrinally defined areas that are integral to cyberspace operations. An examination of network operations, information operations, and several other, more focused areas across the U.S. military found significant overlap and potential boundary progression that could inform the development of future Army doctrine.


Book
Co-governed Sovereignty Network : Legal Basis and Its Prototype & Applications with MIN Architecture
Authors: ---
ISBN: 9811626707 9811626693 Year: 2021 Publisher: Singapore : Springer Nature Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN network implements the “four principles” of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network.


Book
The other quiet professionals
Authors: --- ---
ISBN: 0833088009 0833088025 0833059734 9780833088024 9780833059734 9780833088000 Year: 2014 Publisher: Santa Monica, California

Loading...
Export citation

Choose an application

Bookmark

Abstract

With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.

Keywords

Computer networks -- Security measures -- United States -- Planning. --- Cyberspace -- Security measures -- United States -- Planning. --- Cyberterrorism -- United States -- Prevention -- Planning. --- Information warfare -- United States. --- Special forces (Military science) -- United States -- History. --- U.S. Special Operations Command -- History. --- United States. Strategic Command (2002- ). Cyber Command -- History. --- Cyberspace --- Computer networks --- Cyberterrorism --- Information warfare --- Special forces (Military science) --- Military & Naval Science --- Law, Politics & Government --- Military Science - General --- Planning --- Security measures --- Prevention --- History --- Planning. --- United States. --- U.S. Special Operations Command --- History. --- Computer security --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- U.S. Cyber Command --- US Cyber Command --- USCYBERCOM --- CYBERCOM --- US Special Operations Command --- USSOCOM --- SOCOM --- Protection of computer systems --- Protection --- Computer crimes --- Terrorism --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data protection --- Security systems --- Hacking --- Distributed processing --- Space and time --- Telematics --- Electronic terrorism (Cyberterrorism)

Listing 1 - 5 of 5
Sort by