Cyber infrastructure protection. (Record no. 78186)

MARC details
000 -LEADER
fixed length control field 04204cam a22003617i 4500
001 - CONTROL NUMBER
control field 14568570
003 - CONTROL NUMBER IDENTIFIER
control field SE-LIBR
005 - DATE AND TIME
control field 20130722123504.0
008 - GENERAL INFORMATION
fixed length control field 130703s2013 paua f000 0 eng d
020 ## - ISBN
ISBN 1584875712
020 ## - ISBN
ISBN 9781584875710
040 ## - CATALOGUING LIBRARY
Original cataloging library AWC
Modifying library Alb
-- Sipr
041 ## - LANGUAGE CODE
Language code eng
245 00 - TITLE
Title Cyber infrastructure protection.
Number Vol. II /
Author, etc editors, Tarek Saadawi, Louis H. Jordan, Jr., Vincent Boudreau
260 ## - PUBLICATION DATA
Place of publication Carlisle, PA :
Publisher Strategic Studies Institute and U.S. Army War College Press,
Year 2013
300 ## - PAGES ETC
Pages viii, 267 pages :
Details illustrations ;
Dimensions 23 cm
500 ## - GENERAL NOTE
General note SIP1307
500 ## - GENERAL NOTE
General note "May 2013."
504 ## - BIBLIOGRAPHY, ETC. NOTE
About the authors Includes bibliographical references.
505 0# - CONTENTS
Contents 1. Introduction / Tarek Saadawi, Louis H. Jordan, Jr., and Vincent Boudreau -- Part I: Economics and social aspects of cyber security. 2. Exploring the economics of the malicious software market / Thomas J. Holt -- 3. The emergence of the civilian cyber warrior / Max Kilger -- Part II: Law and cybercrime. 4. Changing the game : social and justice models for enhanced cyber security / Michael M. Losavio, J. Eagle Shutt, and Deborah Wilson Keeling -- 5. An institutional and developmental analysis of the data breach disclosure laws / Melissa Dark -- 6. Cyber security and identity : solutions for critical infrastructure that protect civil liberties and enhance security / Joshua Gruenspecht -- 7. Exploring the utility of open source data to predict malicious software creation / George W. Burruss, Thomas J. Holt, and Adam M. Bossler -- Part III: Cyber infrastructure. 8. ISP grade threat monitoring / Abhrajit Ghosh -- 9. The challenges associated with assessing cyber issues / Stuart H. Starr.
520 ## - SUMMARY
Summary, etc Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation's cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation's mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare. Cyber attackers can introduce new viruses, worms, and bots capable of defeating many of our efforts. Costs to the economy from these threats are huge and increasing. Government, business, and academia must therefore work together to understand the threat and develop various modes of fighting cyber attacks, and to establish and enhance a framework to assess the vulnerability of our cyber infrastructure and provide strategic policy directions for the protection of such an infrastructure. This book addresses such questions as: How serious is the cyber threat? What technical and policy-based approaches are best suited to securing telecommunications networks and information systems infrastructure security? What role will government and the private sector play in homeland defense against cyber attacks on critical civilian infrastructure, financial, and logistical systems? What legal impediments exist concerning efforts to defend the nation against cyber attacks, especially in preventive, preemptive, and retaliatory actions?
650 #0 - KEYWORD
Keyword legislation
Subdivision logistics
Geographic subdivision USA
650 #7 - KEYWORD
Keyword computers
Subdivision security
-- protection
Geographic subdivision USA
653 ## - UNCONTROLLED KEYWORD
Uncontrolled keyword cyberinfrastructure
653 ## - UNCONTROLLED KEYWORD
Uncontrolled keyword computer networks
700 1# - ADDED AUTHOR/EDITOR
Author/Editor Saadawi, Tarek Nazir,
700 1# - ADDED AUTHOR/EDITOR
Author/Editor Jordan, Louis,
700 1# - ADDED AUTHOR/EDITOR
Author/Editor Boudreau, Vincent
710 2# - ADDED INSTITUTION
Institution US Army War College.
Subordinate unit Strategic Studies Institute
852 ## - LOCATION
Classification part 007 Cyber
856 41 - ELECTRONIC LOCATION
URI http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1145
942 ## - ITEM TYPE (KOHA)
Koha item type monograph
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Acquisition no. Date last seen Koha item type
        SIPRI Library and Documentation SIPRI Library and Documentation 2013-07-22   007 Cyber G13/422 2013-07-22 monograph