SEADE: Countering the Futility of Network Security

Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a d...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Konieczny, Frank, Trias, Eric, Taylor, Nevin J
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Konieczny, Frank
Trias, Eric
Taylor, Nevin J
description Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords (e.g., default value, simple number strings, or the word password itself). Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access. Pub in Air & Space Power Journal, p4-14 Sep-Oct 2015.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_ADA624282</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ADA624282</sourcerecordid><originalsourceid>FETCH-dtic_stinet_ADA6242823</originalsourceid><addsrcrecordid>eNrjZDAKdnV0cbVScM4vzStJLcrMS1coyUhVcCstyczJLKlUyE9T8EstKc8vylYITk0uLQKK8TCwpiXmFKfyQmluBhk31xBnD92Ukszk-OKSzLzUknhHF0czIxMjCyNjAtIAsZAocQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>SEADE: Countering the Futility of Network Security</title><source>DTIC Technical Reports</source><creator>Konieczny, Frank ; Trias, Eric ; Taylor, Nevin J</creator><creatorcontrib>Konieczny, Frank ; Trias, Eric ; Taylor, Nevin J ; AIR AND SPACE POWER JOURNAL MAXWELL AFB AL</creatorcontrib><description>Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords (e.g., default value, simple number strings, or the word password itself). Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access. Pub in Air &amp; Space Power Journal, p4-14 Sep-Oct 2015.</description><language>eng</language><subject>ACCESS ; Computer Systems Management and Standards ; DATA TRANSMISSION SECURITY ; NETWORK ARCHITECTURE ; VULNERABILITY</subject><creationdate>2015</creationdate><rights>Approved for public release; distribution is unlimited.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27566,27567</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/ADA624282$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Konieczny, Frank</creatorcontrib><creatorcontrib>Trias, Eric</creatorcontrib><creatorcontrib>Taylor, Nevin J</creatorcontrib><creatorcontrib>AIR AND SPACE POWER JOURNAL MAXWELL AFB AL</creatorcontrib><title>SEADE: Countering the Futility of Network Security</title><description>Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords (e.g., default value, simple number strings, or the word password itself). Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access. Pub in Air &amp; Space Power Journal, p4-14 Sep-Oct 2015.</description><subject>ACCESS</subject><subject>Computer Systems Management and Standards</subject><subject>DATA TRANSMISSION SECURITY</subject><subject>NETWORK ARCHITECTURE</subject><subject>VULNERABILITY</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2015</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZDAKdnV0cbVScM4vzStJLcrMS1coyUhVcCstyczJLKlUyE9T8EstKc8vylYITk0uLQKK8TCwpiXmFKfyQmluBhk31xBnD92Ukszk-OKSzLzUknhHF0czIxMjCyNjAtIAsZAocQ</recordid><startdate>201510</startdate><enddate>201510</enddate><creator>Konieczny, Frank</creator><creator>Trias, Eric</creator><creator>Taylor, Nevin J</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>201510</creationdate><title>SEADE: Countering the Futility of Network Security</title><author>Konieczny, Frank ; Trias, Eric ; Taylor, Nevin J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_ADA6242823</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2015</creationdate><topic>ACCESS</topic><topic>Computer Systems Management and Standards</topic><topic>DATA TRANSMISSION SECURITY</topic><topic>NETWORK ARCHITECTURE</topic><topic>VULNERABILITY</topic><toplevel>online_resources</toplevel><creatorcontrib>Konieczny, Frank</creatorcontrib><creatorcontrib>Trias, Eric</creatorcontrib><creatorcontrib>Taylor, Nevin J</creatorcontrib><creatorcontrib>AIR AND SPACE POWER JOURNAL MAXWELL AFB AL</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Konieczny, Frank</au><au>Trias, Eric</au><au>Taylor, Nevin J</au><aucorp>AIR AND SPACE POWER JOURNAL MAXWELL AFB AL</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>SEADE: Countering the Futility of Network Security</btitle><date>2015-10</date><risdate>2015</risdate><abstract>Today s media is flooded with stories of cyber attacks prompting a loss of public confidence, resignations by senior officials, and a significant near- and long-term impact on our nation. Most of these breaches stem from known vulnerabilities in existing network security architecture, presenting a distinct danger to our vital national interests. These vulnerabilities, which vary in sophistication, could be as simple as using weak passwords (e.g., default value, simple number strings, or the word password itself). Slightly more sophisticated attacks leverage phishing attempts through e-mail or social engineering, designed to elicit unsafe action or information that would allow adversaries unauthorized access. Pub in Air &amp; Space Power Journal, p4-14 Sep-Oct 2015.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_ADA624282
source DTIC Technical Reports
subjects ACCESS
Computer Systems Management and Standards
DATA TRANSMISSION SECURITY
NETWORK ARCHITECTURE
VULNERABILITY
title SEADE: Countering the Futility of Network Security
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T07%3A50%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=SEADE:%20Countering%20the%20Futility%20of%20Network%20Security&rft.au=Konieczny,%20Frank&rft.aucorp=AIR%20AND%20SPACE%20POWER%20JOURNAL%20MAXWELL%20AFB%20AL&rft.date=2015-10&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EADA624282%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true