A Cyberworm that Knows No Boundaries

It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Porche III, Isaac R, Sollinger, Jerry M, McKay, Shawn
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Porche III, Isaac R
Sollinger, Jerry M
McKay, Shawn
description It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.
doi_str_mv 10.7249/OP342OSD
format Book
fullrecord <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_ebookcentral_EBC846009</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>10.7249/op342osd</jstor_id><sourcerecordid>10.7249/op342osd</sourcerecordid><originalsourceid>FETCH-LOGICAL-a65257-397d1b67daa55e0f897521a127094217aba5a87d7040018d2c16df059f8f358c3</originalsourceid><addsrcrecordid>eNqFkL1PwzAQxY0QiFIqscOQAcEU8Gdsj20oH6IiSCDW6BI7glLiYKeq-O9xFQY2bjmd3k937x1CxwRfSsr1VfHEOC2er3fQIVaMYaEVlrt_h300UkKyTDCuDtAkhCWOpblmgozQ2TTJvyvrN85_Jv0b9MlD6zYheXTJzK1bA_7dhiO018Aq2MlvH6PXm_lLfpcuitv7fLpIIRNUyJRpaUiVSQMghMWN0lJQAoTKeI8SCRUIUNJIzDEmytCaZKaJNhvVMKFqNkbnw-LOu6-1DX1pK-c-atv2HlblfJYrnkXzEbz4ByQxMZFb8nQgHXS2LY2DLRhKQnh0F-WTQV6G3vly0FwXn-qCYT8_oWM1</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC1365179</pqid></control><display><type>book</type><title>A Cyberworm that Knows No Boundaries</title><source>JSTOR eBooks: Open Access</source><source>DOAB: Directory of Open Access Books</source><creator>Porche III, Isaac R ; Sollinger, Jerry M ; McKay, Shawn</creator><creatorcontrib>Porche III, Isaac R ; Sollinger, Jerry M ; McKay, Shawn</creatorcontrib><description>It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.</description><edition>1</edition><identifier>ISBN: 0833059807</identifier><identifier>ISBN: 9780833059802</identifier><identifier>EISBN: 0833059807</identifier><identifier>EISBN: 9780833059802</identifier><identifier>EISBN: 9780833059710</identifier><identifier>EISBN: 0833059718</identifier><identifier>DOI: 10.7249/OP342OSD</identifier><identifier>OCLC: 857365348</identifier><identifier>OCLC: 779827926</identifier><language>eng</language><publisher>Santa Monica: RAND Corporation</publisher><subject>Computer networks ; Computer security ; Computer viruses, Trojans and worms ; Computing and Information Technology ; Digital Lifestyle and online world: consumer and user guides ; Security measures ; Technology ; United States</subject><creationdate>2011</creationdate><tpages>54</tpages><format>54</format><rights>2011 RAND Corporation</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,776,780,782,24341,24760,27904,55289</link.rule.ids></links><search><creatorcontrib>Porche III, Isaac R</creatorcontrib><creatorcontrib>Sollinger, Jerry M</creatorcontrib><creatorcontrib>McKay, Shawn</creatorcontrib><title>A Cyberworm that Knows No Boundaries</title><description>It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.</description><subject>Computer networks</subject><subject>Computer security</subject><subject>Computer viruses, Trojans and worms</subject><subject>Computing and Information Technology</subject><subject>Digital Lifestyle and online world: consumer and user guides</subject><subject>Security measures</subject><subject>Technology</subject><subject>United States</subject><isbn>0833059807</isbn><isbn>9780833059802</isbn><isbn>0833059807</isbn><isbn>9780833059802</isbn><isbn>9780833059710</isbn><isbn>0833059718</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2011</creationdate><recordtype>book</recordtype><sourceid>BAHZO</sourceid><sourceid>V1H</sourceid><recordid>eNqFkL1PwzAQxY0QiFIqscOQAcEU8Gdsj20oH6IiSCDW6BI7glLiYKeq-O9xFQY2bjmd3k937x1CxwRfSsr1VfHEOC2er3fQIVaMYaEVlrt_h300UkKyTDCuDtAkhCWOpblmgozQ2TTJvyvrN85_Jv0b9MlD6zYheXTJzK1bA_7dhiO018Aq2MlvH6PXm_lLfpcuitv7fLpIIRNUyJRpaUiVSQMghMWN0lJQAoTKeI8SCRUIUNJIzDEmytCaZKaJNhvVMKFqNkbnw-LOu6-1DX1pK-c-atv2HlblfJYrnkXzEbz4ByQxMZFb8nQgHXS2LY2DLRhKQnh0F-WTQV6G3vly0FwXn-qCYT8_oWM1</recordid><startdate>2011</startdate><enddate>2011</enddate><creator>Porche III, Isaac R</creator><creator>Sollinger, Jerry M</creator><creator>McKay, Shawn</creator><general>RAND Corporation</general><general>RAND Corporation, The</general><scope>BAHZO</scope><scope>V1H</scope></search><sort><creationdate>2011</creationdate><title>A Cyberworm that Knows No Boundaries</title><author>Porche III, Isaac R ; Sollinger, Jerry M ; McKay, Shawn</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a65257-397d1b67daa55e0f897521a127094217aba5a87d7040018d2c16df059f8f358c3</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer networks</topic><topic>Computer security</topic><topic>Computer viruses, Trojans and worms</topic><topic>Computing and Information Technology</topic><topic>Digital Lifestyle and online world: consumer and user guides</topic><topic>Security measures</topic><topic>Technology</topic><topic>United States</topic><toplevel>online_resources</toplevel><creatorcontrib>Porche III, Isaac R</creatorcontrib><creatorcontrib>Sollinger, Jerry M</creatorcontrib><creatorcontrib>McKay, Shawn</creatorcontrib><collection>JSTOR eBooks: Open Access</collection><collection>DOAB: Directory of Open Access Books</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Porche III, Isaac R</au><au>Sollinger, Jerry M</au><au>McKay, Shawn</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>A Cyberworm that Knows No Boundaries</btitle><date>2011</date><risdate>2011</risdate><isbn>0833059807</isbn><isbn>9780833059802</isbn><eisbn>0833059807</eisbn><eisbn>9780833059802</eisbn><eisbn>9780833059710</eisbn><eisbn>0833059718</eisbn><abstract>It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.</abstract><cop>Santa Monica</cop><pub>RAND Corporation</pub><doi>10.7249/OP342OSD</doi><oclcid>857365348</oclcid><oclcid>779827926</oclcid><tpages>54</tpages><edition>1</edition><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISBN: 0833059807
ispartof
issn
language eng
recordid cdi_proquest_ebookcentral_EBC846009
source JSTOR eBooks: Open Access; DOAB: Directory of Open Access Books
subjects Computer networks
Computer security
Computer viruses, Trojans and worms
Computing and Information Technology
Digital Lifestyle and online world: consumer and user guides
Security measures
Technology
United States
title A Cyberworm that Knows No Boundaries
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T02%3A25%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=A%20Cyberworm%20that%20Knows%20No%20Boundaries&rft.au=Porche%20III,%20Isaac%20R&rft.date=2011&rft.isbn=0833059807&rft.isbn_list=9780833059802&rft_id=info:doi/10.7249/OP342OSD&rft_dat=%3Cjstor_proqu%3E10.7249/op342osd%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&rft.eisbn=0833059807&rft.eisbn_list=9780833059802&rft.eisbn_list=9780833059710&rft.eisbn_list=0833059718&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC1365179&rft_id=info:pmid/&rft_jstor_id=10.7249/op342osd&rfr_iscdi=true