Query Result Set
Skip Navigation Links
   ActiveUsers:1602Hits:18326785Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
INFORMATION SECURITY (61) answer(s).
 
1234Next
SrlItem
1
ID:   137241


Attributing cyber attacks / Rid, Thomas; Buchanan, Ben   Article
Rid, Thomas Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.
        Export Export
2
ID:   164208


Basic principles of russian state policy on international information security: regulation and implementation mechanisms / Boiko, S   Journal Article
Boiko, S Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract National Security Strategic Planning Documents on the Basic Principles of Russian State Policy in the Field of International Information Security ON JULY 24, 2018, it was five years since the approval by the president of the Russian Federation in 2013 of a key strategic planning document in the sphere of national security called Basic Principles of State Policy of the Russian Federation in the Field of International Information Security to 2020.1 Ensuring international information security in today's conditions of unprecedented increase in information security threats is of primary importance for achieving national security. This conclusion is confirmed by the provisions of the main strategic planning document in the area of security, the National Security Strategy of the Russian Federation as approved by Presidential Decree No. 683 of December 31, 2015,2 and by a number of other similar documents.
        Export Export
3
ID:   046342


Betting on America: why the U. S. can be stronger after September 11 / Cortada, James W; Wakin, Edward 2002  Book
Cortada, James W. Book
0 Rating(s) & 0 Review(s)
Publication London, Prentice Hall, 2002.
Description xiii, 257p.hbk
Standard Number 0130460788
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
046326973/COR 046326MainOn ShelfGeneral 
4
ID:   080331


Canada's communications security establishment, signals intelli / Rudner, Martin   Journal Article
Rudner, Martin Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Summary/Abstract Canada's Communications Security Establishment has undergone a far-reaching transformation in conjunction with the expanded role of Signals Intelligence in the global 'war on terror'. For the first time, Canada adopted a formal statute for CSE, including an expanded remit for countering terrorism. With a shift in targeting priorities towards terrorism and threats to Canadian interests abroad, Canada's participation in SIGINT-related international partnerships takes on new significance. The collection of communication intelligence touches upon public sensibilities regarding privacy rights of Canadians. The evolution of Canadian SIGINT capabilities was therefore accompanied by the establishment, as early as 1996, of a system for intelligence accountability and review, the Office of the CSE Commissioner. Recent advances in communications technology and pressing requirements for Signals Intelligence have impelled changes in the law, while also accentuating the role played by the CSE Commissioner in scrutinizing CSE activities to ensure compliance with ministerial authorizations and the laws of Canada
        Export Export
5
ID:   046810


Challenge and change in the information society / Hornby, Susan (ed); Clarke, Zoe (ed) 2003  Book
Hornby, Susan (ed.) Book
0 Rating(s) & 0 Review(s)
Publication London, Facet Publishing, 2003.
Description xvi, 239 p.
Standard Number 085604453x
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
046868303.4/HOR 046868MainOn ShelfGeneral 
6
ID:   067283


Challenge of information security / Rank, Hanno; Schmitt, Burkard 2005  Journal Article
Rank, Hanno Journal Article
0 Rating(s) & 0 Review(s)
Publication 2005.
        Export Export
7
ID:   080594


Challenges to information security / Aiyengar, S R R   Journal Article
Aiyengar, S R R Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
        Export Export
8
ID:   080600


Chellenges to information security as a consequence of informat / Ghosh, Abhimanyu   Journal Article
Ghosh, Abhimanyu Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
        Export Export
9
ID:   108632


China and Russia submit cyber proposal / Farnsworth, Timothy   Journal Article
Farnsworth, Timothy Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract China and Russia surprised the international community last month when they submitted a letter at the UN General Assembly outlining a proposal for an International Code of Conduct for Information Security. The Sept. 12 proposal, which was supported by Tajikistan and Uzbekistan, came less than two months before the first major international conference on establishing international norms in cyberspace is set to take place in London.
        Export Export
10
ID:   105605


Commander's strategy for social media / Mayfield, Thomas D   Journal Article
Mayfield, Thomas D Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words Iran  Information Security  Social Media 
        Export Export
11
ID:   053130


Congress scrutinizes information security efforts / Lawlor, Maryann Aug 2004  Journal Article
Lawlor, Maryann Journal Article
0 Rating(s) & 0 Review(s)
Publication Aug 2004.
        Export Export
12
ID:   137403


Cosmic top secret Europe: the legacy of North Atlantic Treaty Organization and cold war US policy on European Union information policy / Schilde, Kaija E   Article
Schilde, Kaija E Article
0 Rating(s) & 0 Review(s)
Summary/Abstract As the EU has expanded its authority into areas of high politics such as monetary, defense, and foreign policy, it has simultaneously developed procedures for handling more sensitive and classified information. These critical policy domains require standards regulating secure information and personnel, but the concept of official secrets is in tension with the treaty norms of the EU. Observers allege that the classified information policy of the EU was imposed through the coercion of external actors such as North Atlantic Treaty Organization (NATO) and the USA in a significant historical departure from the information security policies of European member states. This article evaluates the content of EU-classified information policies and compares them to the content of European member states, NATO, and the USA, in an effort to clarify the mechanisms of policy diffusion in the area of information security.
        Export Export
13
ID:   144666


Counterintelligence theory and practice / Prunckun, Hank 2014  Book
Prunckun, Hank Book
0 Rating(s) & 0 Review(s)
Edition 1st Indian ed.
Publication New Delhi, Pentagon Press, 2014.
Description xv, 239p.hbk
Standard Number 9788182747920
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058638327.12/PRU 058638MainOn ShelfGeneral 
14
ID:   128705


Cyber operations: bridging form concept to cyber superiority / Kallberg, Jan; Thuraisingham, Bhavani   Journal Article
Thuraisingham, Bhavani Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
15
ID:   112576


Cybersecurity: essential body of knowledge / Shoemaker, Dan; Conklin, Arthur Wm. 2012  Book
Shoemaker, Dan Book
0 Rating(s) & 0 Review(s)
Publication Australia, Course Technology, 2012.
Description xxiv, 500p.Pbk
Standard Number 9781435481695
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
056531005.8/SHO 056531MainOn ShelfGeneral 
16
ID:   046385


Deciphering cyberspace: making the most of digital communication technology / Shyles, Leonard 2003  Book
Shyles, Leonard Book
0 Rating(s) & 0 Review(s)
Publication London, Sage Publications, 2003.
Description xi, 415p.
Standard Number 0761922202
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
046371303.4833/SHY 046371MainOn ShelfGeneral 
17
ID:   099956


Decision of the National People's Congress Standing Committee o / Ninth National People's Congress Standing Committee   Journal Article
Ninth National People's Congress Standing Committee Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
18
ID:   010413


Deta protection and information security / Raman B Jan-March 1996  Article
Raman B Article
0 Rating(s) & 0 Review(s)
Publication Jan-march 1996.
Description 77-85
        Export Export
19
ID:   078875


Few perceptions of the current information security issue / Gaofeng, Zhu   Journal Article
Gaofeng, Zhu Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Key Words Information Security 
        Export Export
20
ID:   140996


Formal risk-effectiveness analysis proposal for the compartmentalized intelligence security structure / Javorsek, Daniel II   Article
Daniel Javorsek II Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Information security has quietly played a significant role in the development of the contemporary U.S. hegemony in world affairs. In addition to safeguarding its most vital technological advancements, information security has preserved its tactical advantage by protecting the “ways and means” of intelligence collection and served as the foundation for U.S. military dominance.1 In part due to these efforts, U.S. weapon systems have dominated the conventional battlefield since the end of the Cold War, but recent trends indicate this margin may be shrinking. Using defense related spending as a proxy for future military dominance; a recent study suggests that by 2035, U.S. spending could be eclipsed by a resurgent China that, at 2.3 million strong, already has the world's largest active military force.2
        Export Export
1234Next