Query Result Set
Skip Navigation Links
   ActiveUsers:1861Hits:19272635Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CILLUFFO, FRANK J (3) answer(s).
 
SrlItem
1
ID:   123348


Estonia's cyber defence league: a model for the United States? / Cardash, Sharon L; Cilluffo, Frank J; Ottis, Rain   Journal Article
Cilluffo, Frank J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The cyber threat spectrum that prevails today is both broad and deep. While we cannot protect everything, everywhere, all the time, we can and must make a concerted and sustained effort to shore up national defenses as they pertain to cybersecurity. Despite considerable differences of scale and scope, Estonia's made-in-country cyber solutions may hold promise for the United States, at least with some adjustments and tailoring to take into account differing requirements and traditions. There may be much to learn from a country that bills itself as "e-Estonia, the digital society," and also delivers on that promise. Specifically, the country's Cyber Defence League is a concept and construct that may prove useful for the United States to consider and contemplate at a time when significant cyber threats continue to multiply, but the skilled personnel needed to counter the challenge are in short supply on the U.S. side.
        Export Export
2
ID:   012283


Information warfare and strategic terrorism / Cilluffo, Frank J Spring 1997  Article
Cilluffo, Frank J Article
0 Rating(s) & 0 Review(s)
Publication Spring 1997.
Description 84-94
Key Words Information Warfare  Terrorism 
        Export Export
3
ID:   128829


Repurposing cyber command / Cilluffo, Frank J; Clark, Joseph R   Journal Article
Cilluffo, Frank J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013-14.
Summary/Abstract Recent debate about the organizational relationship between cyber command and the NSA stress political issues over force employment. This article focuses on the latter, making the case that cyber command should be split from the NSA, because nations that marshal and molilize their cyber power and integrate it into strategy and doctrine will ensure significant national security advantage. Cyber command provides the best route for developing the tactics, technique, and procedures necessary for achieving these goals.
        Export Export