Coverart for item
The Resource A cyberworm that knows no boundaries, Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay

A cyberworm that knows no boundaries, Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay

Label
A cyberworm that knows no boundaries
Title
A cyberworm that knows no boundaries
Statement of responsibility
Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay
Creator
Contributor
Subject
Language
eng
Summary
Stuxnet-like worms and other sophisticated, virulent malware pose a serious threat to critical U.S. infrastructure and computer networks. However, defending against such attacks involves complex technological and legal issues
Member of
Cataloging source
EBLCP
http://library.link/vocab/creatorDate
1968-
http://library.link/vocab/creatorName
Porche, Isaac
Dewey number
005.8
Illustrations
illustrations
Index
no index present
LC call number
QA76.76.C68
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Sollinger, Jerry M
  • McKay, Shawn
Series statement
Occasional paper
Series volume
OP-342-OSD
http://library.link/vocab/subjectName
  • Computer viruses
  • Cyberspace
  • Cyberinfrastructure
  • Computer networks
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer networks
  • Computer viruses
  • Engineering & Applied Sciences
  • Computer Science
Label
A cyberworm that knows no boundaries, Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay
Instantiates
Publication
Note
"Prepared for the Office of the Secretary of Defense."
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace
  • How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations
  • Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography
Control code
779827926
Dimensions
unknown
Extent
1 online resource (54 pages)
Form of item
online
Isbn
9780833059802
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
22573/cttpdg5
Specific material designation
remote
System control number
(OCoLC)779827926
Label
A cyberworm that knows no boundaries, Isaac R. Porche III, Jerry M. Sollinger, Shawn McKay
Publication
Note
"Prepared for the Office of the Secretary of Defense."
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Copyright; Preface; Contents; Figures and Tables; Figures; A.1. Cyberspace Today; A.2. Cyberspace and Social Networking; B.1. Conficker Worm Progression; Tables; 1. Selected Relevant U.S. Organizational Initiatives, Laws, and Reviews; 2. Organizational Strengths and Weaknesses of Federal Agencies in Defending U.S. Cyberspace Infrastructure; 3. Examples of Proposed Legislation Regarding the Assignment of Federal Roles in Cyberspace; D.1. Federal Cyber Legislation; Summary; Acknowledgments; Abbreviations; A Cyberworm That Knows No Boundaries; The Difficulty of Defending Cyberspace
  • How to Identify an AttackWhat Was Needed to Carry Out the Attack; The Implications of Stuxnet and Similar Worms; Implications of the Success of Stuxnet; What Is Needed to Defend Against Stuxnet and Similar Worms; How Organizational Boundaries Hinder Efforts to Mount an Effective Defence; Intragovernmental Limitations; Intersectional Limitations; Conclusions; The Threat of and Opportunity for Real Damage from Cyberspace Is Increasing; Not All Attacks Can Be Prevented; The Best Defense Includes an Offense; Current Organizational Boundaries Hinder Identification and Mitigation; Recommendations
  • Future WorkAppendixes; Appendix A: The Cyberspace Domain; Appendix B: Worms; Appendix C: Einstein Intrusion Detection and Protection; Appendix D: Federal Cyber Legislation; Bibliography
Control code
779827926
Dimensions
unknown
Extent
1 online resource (54 pages)
Form of item
online
Isbn
9780833059802
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
22573/cttpdg5
Specific material designation
remote
System control number
(OCoLC)779827926

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...