Limit search to available items
Book Cover
E-book

Title Cyber infrastructure protection : selected issues and analyses / Howard C. Collins and Connor R. Hughes editors
Published New York : Nova Publishers, [2013]
©2013

Copies

Description 1 online resource
Series Internet policies and issues
Internet policies and issues.
Contents CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; Library of Congress Cataloging-in-Publication Data; Contents; Preface ; Chapter 1: Cyber Intrastructure Protection; SECTION 1. INTRODUCTION; Strategy and Policy Aspects; Legal and Social Aspects; Technical Aspects; PART I. STRATEGY AND POLICY ASPECTS; SECTION 2. DEVELOPING A THEORY OF CYBERPOWER; Introduction; Elements of a Theory; Key Challenges; SECTION 3. SURVIVABILITY OF THE INTERNET; Introduction; Symposium Data Collection; Current Escalating Situation
General DiscussionConclusion; APPENDIX; Planning Guidelines; REFERENCES; SECTION 4. ARE LARGE-SCALE DATA BREACHES INEVITABLE?; Introduction; Notable Breaches: Institutions, Causes, and Costs; Monetizing the Crime; Challenges and Remedies; Concluding Remarks; SECTION 5. THE ROLE OF CYBERPOWER IN HUMANITARIAN ASSISTANCE/DISASTER RELIEF (HA/DR) AND STABILITY AND RECONSTRUCTION OPERATIONS; Introduction; Role of Cyber and Challenges; Commercial ICT Capability Packages; ICT Strategy for Stability and Reconstruction Operations-Afghanistan Example; Observations; PART II: SOCIAL AND LEGAL ASPECTS
SECTION 6. THE INFORMATION POLITY: SOCIAL ANDLEGAL FRAMEWORKS FOR CRITICAL CYBERINFRASTRUCTURE PROTECTIONIntroduction; Jurisdiction among Distributed Sovereigns; Local Substantive Criminal Law and the Exercise of Sovereignty; A Transnational Legal Regime and Cooperation across Frontiers-The Convention on Cybercrime; Social Norms and Criminological Theory; Administrative Engagement- Marshalling and Enabling Existing Law Enforcement; Citizen Engagement; Conclusion; SECTION 7. THE ATTACK DYNAMICS OF POLITICAL AND RELIGIOUSLY MOTIVATED HACKERS; Introduction; Data and Method; Findings
Discussion and ConclusionPART III: TECHNICAL ASPECTS; SECTION 8. RESILIENCE OF DATA CENTERS; Introduction; State of the Art; Conclusion; SECTION 9. DEVELOPING HIGH FIDELITY SENSORS FOR INTRUSION ACTIVITY ON ENTERPRISE NETWORKS; Introduction; Current Issues; The Virtual Environment; Conclusions; SECTION 10. VOICE OVER IP: RISKS, THREATS,AND VULNERABILITIES; Introduction; VOIP Technologies Overview; VoIP Threats; Discussion; Conclusion; SECTION 11. TOWARD FOOLPROOF IP NETWORKCONFIGURATION ASSESSMENTS; Introduction; Configuration Errors Found in Operational IP Networks; Reliability
Regulators Expect ComplianceMany Assessment Approaches Prove Deficient; Toward a Solution That Works; Summary; SECTION 12. ON THE NEW BREED OF DENIAL OF SERVICE (DOS) ATTACKS IN THE INTERNET; Introduction; Traditional Brute Force Attacks; New Breed of Stealthy DoS Attacks; Defense Systems; Future Research Directions; Conclusion; About the Contributors; End Notes; Chapter 2: Cyber Infrastructure Protection: Volume II; FOREWORD; SECTION 1. INTRODUCTION; Outline of the Report; Economics and Social Aspects of Cyber Security; Law and Cybercrime; Cyber Infrastructure
Bibliography Includes bibliographical references and index
Notes English
Description based on print version record
Subject Computer security.
Data protection.
Computer Security
COMPUTERS -- Security -- General.
Computer security
Data protection
Form Electronic book
Author Collins, Howard C
Hughes, Connor R
LC no. 2020678488
ISBN 9781628085822
1628085827