Assessing the Computer Network Operations Threat of Foreign Countries(PREPRINT)
暂无分享,去创建一个
Abstract : As the introduction to this book so aptly stated, advances in information technologies simultaneously empower and imperil those who use them. They empower by facilitating communications and the flow of information; they emperil by introducing new vulnerabilities and targets of attack. Information strategy has to adapt to both of these effects, exploiting and leveraging the enabling technologies while protecting against threats to the very same technologies we come to rely upon. In this chapter I address the latter the defensive side of information strategy as it applies to computer and networking technologies. Computer networks have become the target of an ever increasing number of hackers, criminals, spies, and others who have found advantage in exploiting and damaging them. These actors penetrate computer networks in order to steal, degrade, and destroy information and information systems. They launch computer viruses and worms, conduct denial-of-service attacks, vandalize websites, and extort money from victims. The effects have been costly: businesses disrupted or closed, military systems disabled, emergency and banking services suspended, transportation delayed, military and trade secrets compromised, and identity theft and credit card fraud perpetrated around the globe. The potential consequences of cyber attacks will only get worse as our use of and reliance on information technologies increase.
[1] Christopher Brown,et al. Developing a reliable methodology for assessing the computer network operations threat of North Korea , 2004 .
[2] D. Denning. Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy , 2001 .
[3] Jason P Patterson,et al. Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of Iran , 2005 .