Listing 1 - 1 of 1 |
Sort by
|
Choose an application
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
INFORMATION WARFARE--USA --- CYBERTERRORISM--USA--PREVENTION --- CYBERSPACE--SECURITY MEASURES --- COMPUTER NETWORKS--SECURITY MEASURES--USA --- COMPUTER SECURITY--USA --- INFRASTRUCTURE (ECONOMICS)--SECURITY MEASURES--USA --- INFORMATION SUPERHIGHWAY--SECURITY MEASURES--USA --- Civil defense - United States. --- Cyberspace - Security measures. --- Cyberterrorism - United States - Prevention. --- Cyberterrorism - United States - Prevention deleteClassification editClassification. --- Information warfare - United States. --- Information warfare --- Cyberterrorism --- Computer security. --- Computer networks --- Civil defense --- Homeland defense --- Homeland security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Prevention. --- Security measures --- Protection --- Cyberspace --- Security measures. --- Space and time --- Telematics
Listing 1 - 1 of 1 |
Sort by
|