SEADE: Countering the Futility of Network Security
Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a d...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Konieczny, Frank Trias, Eric Taylor, Nevin J |
description | Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords (e.g., default value, simple number strings, or the word password itself). Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access.
Pub in Air & Space Power Journal, p4-14 Sep-Oct 2015. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA624282</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA624282</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA6242823</originalsourceid><addsrcrecordid>eNrjZDAKdnV0cbVScM4vzStJLcrMS1coyUhVcCstyczJLKlUyE9T8EstKc8vylYITk0uLQKK8TCwpiXmFKfyQmluBhk31xBnD92Ukszk-OKSzLzUknhHF0czIxMjCyNjAtIAsZAocQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>SEADE: Countering the Futility of Network Security</title><source>DTIC Technical Reports</source><creator>Konieczny, Frank ; Trias, Eric ; Taylor, Nevin J</creator><creatorcontrib>Konieczny, Frank ; Trias, Eric ; Taylor, Nevin J ; AIR AND SPACE POWER JOURNAL MAXWELL AFB AL</creatorcontrib><description>Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords (e.g., default value, simple number strings, or the word password itself). Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access.
Pub in Air & Space Power Journal, p4-14 Sep-Oct 2015.</description><language>eng</language><subject>ACCESS ; Computer Systems Management and Standards ; DATA TRANSMISSION SECURITY ; NETWORK ARCHITECTURE ; VULNERABILITY</subject><creationdate>2015</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27566,27567</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA624282$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Konieczny, Frank</creatorcontrib><creatorcontrib>Trias, Eric</creatorcontrib><creatorcontrib>Taylor, Nevin J</creatorcontrib><creatorcontrib>AIR AND SPACE POWER JOURNAL MAXWELL AFB AL</creatorcontrib><title>SEADE: Countering the Futility of Network Security</title><description>Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords (e.g., default value, simple number strings, or the word password itself). Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access.
Pub in Air & Space Power Journal, p4-14 Sep-Oct 2015.</description><subject>ACCESS</subject><subject>Computer Systems Management and Standards</subject><subject>DATA TRANSMISSION SECURITY</subject><subject>NETWORK ARCHITECTURE</subject><subject>VULNERABILITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2015</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZDAKdnV0cbVScM4vzStJLcrMS1coyUhVcCstyczJLKlUyE9T8EstKc8vylYITk0uLQKK8TCwpiXmFKfyQmluBhk31xBnD92Ukszk-OKSzLzUknhHF0czIxMjCyNjAtIAsZAocQ</recordid><startdate>201510</startdate><enddate>201510</enddate><creator>Konieczny, Frank</creator><creator>Trias, Eric</creator><creator>Taylor, Nevin J</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>201510</creationdate><title>SEADE: Countering the Futility of Network Security</title><author>Konieczny, Frank ; Trias, Eric ; Taylor, Nevin J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA6242823</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2015</creationdate><topic>ACCESS</topic><topic>Computer Systems Management and Standards</topic><topic>DATA TRANSMISSION SECURITY</topic><topic>NETWORK ARCHITECTURE</topic><topic>VULNERABILITY</topic><toplevel>online_resources</toplevel><creatorcontrib>Konieczny, Frank</creatorcontrib><creatorcontrib>Trias, Eric</creatorcontrib><creatorcontrib>Taylor, Nevin J</creatorcontrib><creatorcontrib>AIR AND SPACE POWER JOURNAL MAXWELL AFB AL</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Konieczny, Frank</au><au>Trias, Eric</au><au>Taylor, Nevin J</au><aucorp>AIR AND SPACE POWER JOURNAL MAXWELL AFB AL</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>SEADE: Countering the Futility of Network Security</btitle><date>2015-10</date><risdate>2015</risdate><abstract>Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords (e.g., default value, simple number strings, or the word password itself). Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access.
Pub in Air & Space Power Journal, p4-14 Sep-Oct 2015.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_ADA624282 |
source | DTIC Technical Reports |
subjects | ACCESS Computer Systems Management and Standards DATA TRANSMISSION SECURITY NETWORK ARCHITECTURE VULNERABILITY |
title | SEADE: Countering the Futility of Network Security |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T07%3A50%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=SEADE:%20Countering%20the%20Futility%20of%20Network%20Security&rft.au=Konieczny,%20Frank&rft.aucorp=AIR%20AND%20SPACE%20POWER%20JOURNAL%20MAXWELL%20AFB%20AL&rft.date=2015-10&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA624282%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |