A Cyberworm that Knows No Boundaries
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Porche III, Isaac R Sollinger, Jerry M McKay, Shawn |
description | It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions. |
doi_str_mv | 10.7249/OP342OSD |
format | Book |
fullrecord | <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_ebookcentral_EBC846009</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>10.7249/op342osd</jstor_id><sourcerecordid>10.7249/op342osd</sourcerecordid><originalsourceid>FETCH-LOGICAL-a65257-397d1b67daa55e0f897521a127094217aba5a87d7040018d2c16df059f8f358c3</originalsourceid><addsrcrecordid>eNqFkL1PwzAQxY0QiFIqscOQAcEU8Gdsj20oH6IiSCDW6BI7glLiYKeq-O9xFQY2bjmd3k937x1CxwRfSsr1VfHEOC2er3fQIVaMYaEVlrt_h300UkKyTDCuDtAkhCWOpblmgozQ2TTJvyvrN85_Jv0b9MlD6zYheXTJzK1bA_7dhiO018Aq2MlvH6PXm_lLfpcuitv7fLpIIRNUyJRpaUiVSQMghMWN0lJQAoTKeI8SCRUIUNJIzDEmytCaZKaJNhvVMKFqNkbnw-LOu6-1DX1pK-c-atv2HlblfJYrnkXzEbz4ByQxMZFb8nQgHXS2LY2DLRhKQnh0F-WTQV6G3vly0FwXn-qCYT8_oWM1</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC1365179</pqid></control><display><type>book</type><title>A Cyberworm that Knows No Boundaries</title><source>JSTOR eBooks: Open Access</source><source>DOAB: Directory of Open Access Books</source><creator>Porche III, Isaac R ; Sollinger, Jerry M ; McKay, Shawn</creator><creatorcontrib>Porche III, Isaac R ; Sollinger, Jerry M ; McKay, Shawn</creatorcontrib><description>It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.</description><edition>1</edition><identifier>ISBN: 0833059807</identifier><identifier>ISBN: 9780833059802</identifier><identifier>EISBN: 0833059807</identifier><identifier>EISBN: 9780833059802</identifier><identifier>EISBN: 9780833059710</identifier><identifier>EISBN: 0833059718</identifier><identifier>DOI: 10.7249/OP342OSD</identifier><identifier>OCLC: 857365348</identifier><identifier>OCLC: 779827926</identifier><language>eng</language><publisher>Santa Monica: RAND Corporation</publisher><subject>Computer networks ; Computer security ; Computer viruses, Trojans and worms ; Computing and Information Technology ; Digital Lifestyle and online world: consumer and user guides ; Security measures ; Technology ; United States</subject><creationdate>2011</creationdate><tpages>54</tpages><format>54</format><rights>2011 RAND Corporation</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,776,780,782,24341,24760,27904,55289</link.rule.ids></links><search><creatorcontrib>Porche III, Isaac R</creatorcontrib><creatorcontrib>Sollinger, Jerry M</creatorcontrib><creatorcontrib>McKay, Shawn</creatorcontrib><title>A Cyberworm that Knows No Boundaries</title><description>It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.</description><subject>Computer networks</subject><subject>Computer security</subject><subject>Computer viruses, Trojans and worms</subject><subject>Computing and Information Technology</subject><subject>Digital Lifestyle and online world: consumer and user guides</subject><subject>Security measures</subject><subject>Technology</subject><subject>United States</subject><isbn>0833059807</isbn><isbn>9780833059802</isbn><isbn>0833059807</isbn><isbn>9780833059802</isbn><isbn>9780833059710</isbn><isbn>0833059718</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2011</creationdate><recordtype>book</recordtype><sourceid>BAHZO</sourceid><sourceid>V1H</sourceid><recordid>eNqFkL1PwzAQxY0QiFIqscOQAcEU8Gdsj20oH6IiSCDW6BI7glLiYKeq-O9xFQY2bjmd3k937x1CxwRfSsr1VfHEOC2er3fQIVaMYaEVlrt_h300UkKyTDCuDtAkhCWOpblmgozQ2TTJvyvrN85_Jv0b9MlD6zYheXTJzK1bA_7dhiO018Aq2MlvH6PXm_lLfpcuitv7fLpIIRNUyJRpaUiVSQMghMWN0lJQAoTKeI8SCRUIUNJIzDEmytCaZKaJNhvVMKFqNkbnw-LOu6-1DX1pK-c-atv2HlblfJYrnkXzEbz4ByQxMZFb8nQgHXS2LY2DLRhKQnh0F-WTQV6G3vly0FwXn-qCYT8_oWM1</recordid><startdate>2011</startdate><enddate>2011</enddate><creator>Porche III, Isaac R</creator><creator>Sollinger, Jerry M</creator><creator>McKay, Shawn</creator><general>RAND Corporation</general><general>RAND Corporation, The</general><scope>BAHZO</scope><scope>V1H</scope></search><sort><creationdate>2011</creationdate><title>A Cyberworm that Knows No Boundaries</title><author>Porche III, Isaac R ; Sollinger, Jerry M ; McKay, Shawn</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a65257-397d1b67daa55e0f897521a127094217aba5a87d7040018d2c16df059f8f358c3</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer networks</topic><topic>Computer security</topic><topic>Computer viruses, Trojans and worms</topic><topic>Computing and Information Technology</topic><topic>Digital Lifestyle and online world: consumer and user guides</topic><topic>Security measures</topic><topic>Technology</topic><topic>United States</topic><toplevel>online_resources</toplevel><creatorcontrib>Porche III, Isaac R</creatorcontrib><creatorcontrib>Sollinger, Jerry M</creatorcontrib><creatorcontrib>McKay, Shawn</creatorcontrib><collection>JSTOR eBooks: Open Access</collection><collection>DOAB: Directory of Open Access Books</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Porche III, Isaac R</au><au>Sollinger, Jerry M</au><au>McKay, Shawn</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>A Cyberworm that Knows No Boundaries</btitle><date>2011</date><risdate>2011</risdate><isbn>0833059807</isbn><isbn>9780833059802</isbn><eisbn>0833059807</eisbn><eisbn>9780833059802</eisbn><eisbn>9780833059710</eisbn><eisbn>0833059718</eisbn><abstract>It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.</abstract><cop>Santa Monica</cop><pub>RAND Corporation</pub><doi>10.7249/OP342OSD</doi><oclcid>857365348</oclcid><oclcid>779827926</oclcid><tpages>54</tpages><edition>1</edition><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISBN: 0833059807 |
ispartof | |
issn | |
language | eng |
recordid | cdi_proquest_ebookcentral_EBC846009 |
source | JSTOR eBooks: Open Access; DOAB: Directory of Open Access Books |
subjects | Computer networks Computer security Computer viruses, Trojans and worms Computing and Information Technology Digital Lifestyle and online world: consumer and user guides Security measures Technology United States |
title | A Cyberworm that Knows No Boundaries |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T02%3A25%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=A%20Cyberworm%20that%20Knows%20No%20Boundaries&rft.au=Porche%20III,%20Isaac%20R&rft.date=2011&rft.isbn=0833059807&rft.isbn_list=9780833059802&rft_id=info:doi/10.7249/OP342OSD&rft_dat=%3Cjstor_proqu%3E10.7249/op342osd%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&rft.eisbn=0833059807&rft.eisbn_list=9780833059802&rft.eisbn_list=9780833059710&rft.eisbn_list=0833059718&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC1365179&rft_id=info:pmid/&rft_jstor_id=10.7249/op342osd&rfr_iscdi=true |