Critical infrastructure protection challenges and efforts to secure control systems : report to congressional requesters.

앞표지
DIANE Publishing

도서 본문에서

선택된 페이지

자주 나오는 단어 및 구문

인기 인용구

15 페이지 - As NIPC reports, the effects of a swarming attack include slowing or complicating the response to a physical attack. For example, cyber attacks can be used to delay the notification of emergency services and to deny the resources needed to manage the consequences of a physical attack. In addition, a swarming attack could be used to worsen the effects of a physical attack. For instance, a cyber attack...
42 페이지 - The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet GAO's Web site (www.gao.gov) contains abstracts and fulltext files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirely, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence....
3 페이지 - Internet, continue to revolutionize the way our government, our nation, and much of the world communicate and conduct business.
5 페이지 - point and click" to start an attack. Experts also agree that there has been a steady advance in the sophistication and effectiveness of attack technology. Intruders quickly develop attacks to exploit vulnerabilities discovered in products, use these attacks to compromise computers, and share them with other attackers. In addition, they can combine these attacks with other forms of technology to develop programs that automatically scan the network for vulnerable systems, attack them, compromise them,...
4 페이지 - The speed and accessibility that create the enormous benefits of the computer age likewise, if not properly controlled, allow individuals and organizations to inexpensively eavesdrop on or interfere with these operations from remote locations for mischievous or malicious purposes, including fraud or sabotage.
7 페이지 - Agency (NSA), foreign governments already have or are developing computer attack capabilities, and potential adversaries are developing a body of knowledge about US systems and methods to attack these systems. Since the terrorist attacks of September 11, 2001, warnings of the potential for terrorist cyber attacks against our critical infrastructures have also increased.
4 페이지 - ... computer systems and, more important, to the critical operations and infrastructures they support. For example, telecommunications, power distribution, water supply, public health services...
4 페이지 - Information warfare Several nations are aggressively working to develop information warfare doctrine, programs, and capabilities. Such capabilities enable a single entity to have a significant and serious impact by disrupting the supply, communications, and economic infrastructures that support military power — impacts that, according to the Director of Central Intelligence, acan affect the daily lives of Americans across the country.
5 페이지 - Worm: an independent computer program that reproduces by copying itself from one system to another across a network. Unlike computer viruses, worms do not require human involvement to propagate.
1 페이지 - ... because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.

도서 문헌정보