ID | 124104 |
Title Proper | Enemy without boundaries |
Language | ENG |
Author | Porche III, Isaac R. ; Sollinger, Jerry M. ; McKay, Shawn |
Publication | 2012. |
Summary / Abstract (Note) | The article offers comments on the need for a strategy and policy to respond to cyber attack as it is allegedly impossible to block every cyber attack. It is suggested that the industries learn from the vulnerability of the networks attacked while understanding that there is no single defense against a sophisticated and constantly morphing offense. Comments on cyberspace having no boundaries and changing constantly and the need to formulate active defense are also included. |
`In' analytical Note | US Naval Institute Proceedings Vol.138, No.10; 2012: p.34-39 |
Journal Source | US Naval Institute Proceedings Vol.138, No.10; 2012: p.34-39 |
Key Words | Cyber Terrorism ; Strategy ; Data Protection ; Cyberspace ; Computer Network Security ; Virtual Battle Place-VBP ; Precedents ; National Security Policy |