Item Details
Skip Navigation Links
   ActiveUsers:1544Hits:19144118Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID124104
Title ProperEnemy without boundaries
LanguageENG
AuthorPorche III, Isaac R. ;  Sollinger, Jerry M. ;  McKay, Shawn
Publication2012.
Summary / Abstract (Note)The article offers comments on the need for a strategy and policy to respond to cyber attack as it is allegedly impossible to block every cyber attack. It is suggested that the industries learn from the vulnerability of the networks attacked while understanding that there is no single defense against a sophisticated and constantly morphing offense. Comments on cyberspace having no boundaries and changing constantly and the need to formulate active defense are also included.
`In' analytical NoteUS Naval Institute Proceedings Vol.138, No.10; 2012: p.34-39
Journal SourceUS Naval Institute Proceedings Vol.138, No.10; 2012: p.34-39
Key WordsCyber Terrorism ;  Strategy ;  Data Protection ;  Cyberspace ;  Computer Network Security ;  Virtual Battle Place-VBP ;  Precedents ;  National Security Policy