FirstCity
Welcome to First City University College Library iPortal | library@firstcity.edu.my | +603-7735 2088 (Ext. 519)
Amazon cover image
Image from Amazon.com

Cyber infrastructure protection : selected issues and analyses / Howard C. Collins and Connor R. Hughes editors.

Contributor(s): Material type: TextTextSeries: Internet policies and issuesPublisher: New York : Nova Publishers, [2013]Copyright date: �2013Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781628085822
  • 1628085827
Subject(s): Genre/Form: Additional physical formats: Print version:: Cyber infrastructure protectionDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; Library of Congress Cataloging-in-Publication Data; Contents; Preface ; Chapter 1: Cyber Intrastructure Protection; SECTION 1. INTRODUCTION; Strategy and Policy Aspects; Legal and Social Aspects; Technical Aspects; PART I. STRATEGY AND POLICY ASPECTS; SECTION 2. DEVELOPING A THEORY OF CYBERPOWER; Introduction; Elements of a Theory; Key Challenges; SECTION 3. SURVIVABILITY OF THE INTERNET; Introduction; Symposium Data Collection; Current Escalating Situation.
General DiscussionConclusion; APPENDIX; Planning Guidelines; REFERENCES; SECTION 4. ARE LARGE-SCALE DATA BREACHES INEVITABLE?; Introduction; Notable Breaches: Institutions, Causes, and Costs; Monetizing the Crime; Challenges and Remedies; Concluding Remarks; SECTION 5. THE ROLE OF CYBERPOWER IN HUMANITARIAN ASSISTANCE/DISASTER RELIEF (HA/DR) AND STABILITY AND RECONSTRUCTION OPERATIONS; Introduction; Role of Cyber and Challenges; Commercial ICT Capability Packages; ICT Strategy for Stability and Reconstruction Operations-Afghanistan Example; Observations; PART II: SOCIAL AND LEGAL ASPECTS.
SECTION 6. THE INFORMATION POLITY: SOCIAL ANDLEGAL FRAMEWORKS FOR CRITICAL CYBERINFRASTRUCTURE PROTECTIONIntroduction; Jurisdiction among Distributed Sovereigns; Local Substantive Criminal Law and the Exercise of Sovereignty; A Transnational Legal Regime and Cooperation across Frontiers-The Convention on Cybercrime; Social Norms and Criminological Theory; Administrative Engagement- Marshalling and Enabling Existing Law Enforcement; Citizen Engagement; Conclusion; SECTION 7. THE ATTACK DYNAMICS OF POLITICAL AND RELIGIOUSLY MOTIVATED HACKERS; Introduction; Data and Method; Findings.
Discussion and ConclusionPART III: TECHNICAL ASPECTS; SECTION 8. RESILIENCE OF DATA CENTERS; Introduction; State of the Art; Conclusion; SECTION 9. DEVELOPING HIGH FIDELITY SENSORS FOR INTRUSION ACTIVITY ON ENTERPRISE NETWORKS; Introduction; Current Issues; The Virtual Environment; Conclusions; SECTION 10. VOICE OVER IP: RISKS, THREATS,AND VULNERABILITIES; Introduction; VOIP Technologies Overview; VoIP Threats; Discussion; Conclusion; SECTION 11. TOWARD FOOLPROOF IP NETWORKCONFIGURATION ASSESSMENTS; Introduction; Configuration Errors Found in Operational IP Networks; Reliability.
Regulators Expect ComplianceMany Assessment Approaches Prove Deficient; Toward a Solution That Works; Summary; SECTION 12. ON THE NEW BREED OF DENIAL OF SERVICE (DOS) ATTACKS IN THE INTERNET; Introduction; Traditional Brute Force Attacks; New Breed of Stealthy DoS Attacks; Defense Systems; Future Research Directions; Conclusion; About the Contributors; End Notes; Chapter 2: Cyber Infrastructure Protection: Volume II; FOREWORD; SECTION 1. INTRODUCTION; Outline of the Report; Economics and Social Aspects of Cyber Security; Law and Cybercrime; Cyber Infrastructure.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

Description based on print version record.

English.

CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; CYBER INFRASTRUCTURE PROTECTION. SELECTED ISSUES AND ANALYSES; Library of Congress Cataloging-in-Publication Data; Contents; Preface ; Chapter 1: Cyber Intrastructure Protection; SECTION 1. INTRODUCTION; Strategy and Policy Aspects; Legal and Social Aspects; Technical Aspects; PART I. STRATEGY AND POLICY ASPECTS; SECTION 2. DEVELOPING A THEORY OF CYBERPOWER; Introduction; Elements of a Theory; Key Challenges; SECTION 3. SURVIVABILITY OF THE INTERNET; Introduction; Symposium Data Collection; Current Escalating Situation.

General DiscussionConclusion; APPENDIX; Planning Guidelines; REFERENCES; SECTION 4. ARE LARGE-SCALE DATA BREACHES INEVITABLE?; Introduction; Notable Breaches: Institutions, Causes, and Costs; Monetizing the Crime; Challenges and Remedies; Concluding Remarks; SECTION 5. THE ROLE OF CYBERPOWER IN HUMANITARIAN ASSISTANCE/DISASTER RELIEF (HA/DR) AND STABILITY AND RECONSTRUCTION OPERATIONS; Introduction; Role of Cyber and Challenges; Commercial ICT Capability Packages; ICT Strategy for Stability and Reconstruction Operations-Afghanistan Example; Observations; PART II: SOCIAL AND LEGAL ASPECTS.

SECTION 6. THE INFORMATION POLITY: SOCIAL ANDLEGAL FRAMEWORKS FOR CRITICAL CYBERINFRASTRUCTURE PROTECTIONIntroduction; Jurisdiction among Distributed Sovereigns; Local Substantive Criminal Law and the Exercise of Sovereignty; A Transnational Legal Regime and Cooperation across Frontiers-The Convention on Cybercrime; Social Norms and Criminological Theory; Administrative Engagement- Marshalling and Enabling Existing Law Enforcement; Citizen Engagement; Conclusion; SECTION 7. THE ATTACK DYNAMICS OF POLITICAL AND RELIGIOUSLY MOTIVATED HACKERS; Introduction; Data and Method; Findings.

Discussion and ConclusionPART III: TECHNICAL ASPECTS; SECTION 8. RESILIENCE OF DATA CENTERS; Introduction; State of the Art; Conclusion; SECTION 9. DEVELOPING HIGH FIDELITY SENSORS FOR INTRUSION ACTIVITY ON ENTERPRISE NETWORKS; Introduction; Current Issues; The Virtual Environment; Conclusions; SECTION 10. VOICE OVER IP: RISKS, THREATS,AND VULNERABILITIES; Introduction; VOIP Technologies Overview; VoIP Threats; Discussion; Conclusion; SECTION 11. TOWARD FOOLPROOF IP NETWORKCONFIGURATION ASSESSMENTS; Introduction; Configuration Errors Found in Operational IP Networks; Reliability.

Regulators Expect ComplianceMany Assessment Approaches Prove Deficient; Toward a Solution That Works; Summary; SECTION 12. ON THE NEW BREED OF DENIAL OF SERVICE (DOS) ATTACKS IN THE INTERNET; Introduction; Traditional Brute Force Attacks; New Breed of Stealthy DoS Attacks; Defense Systems; Future Research Directions; Conclusion; About the Contributors; End Notes; Chapter 2: Cyber Infrastructure Protection: Volume II; FOREWORD; SECTION 1. INTRODUCTION; Outline of the Report; Economics and Social Aspects of Cyber Security; Law and Cybercrime; Cyber Infrastructure.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide