Query Result Set
Skip Navigation Links
   ActiveUsers:1493Hits:18393887Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER THREAT (22) answer(s).
 
12Next
SrlItem
1
ID:   132128


Case for net neutrality: what's wrong with Obama's internal policy / Ammori, Marvin   Journal Article
Ammori, Marvin Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract For all the withering criticism leveled at the White House for its botched rollout of HealthCare.gov, that debacle is not the biggest technology-related failure of Barack Obama's presidency. That inauspicious distinction belongs to his administration's incompetence in another area: reneging on Obama's signature pledge to ensure "net neutrality," the straightforward but powerful idea that Internet service providers (ISPs) should treat all traffic that goes through their networks the same. Net neutrality holds that ISPs shouldn't offer preferential treatment to some websites over others or charge some companies arbitrary fees to reach users. By this logic, AT&T, for example, shouldn't be allowed to grant iTunes Radio a special "fast lane" for its data while forcing Spotify to make do with choppier service.
        Export Export
2
ID:   176280


Culture clash / Ashdown, Neil   Journal Article
Ashdown, Neil Journal Article
0 Rating(s) & 0 Review(s)
Key Words CIA  Cyber Threat 
        Export Export
3
ID:   138650


Cyber – The 21st Century Threat / Mahon, Tim   Article
Mahon, Tim Article
0 Rating(s) & 0 Review(s)
        Export Export
4
ID:   141377


Cyber security challenges for India: an assessment of its preparedness / Dilipraj, E   Conference Proceeding
Dilipraj, E Conference Proceeding
0 Rating(s) & 0 Review(s)
        Export Export
5
ID:   109027


Cyber threat and military challenges / Ghosh, Abhimanyu   Journal Article
Ghosh, Abhimanyu Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
6
ID:   145947


Cyber threat to nuclear stability / Bracken, Paul   Journal Article
Bracken, Paul Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The thesis of this article is that cyber war technologies are spilling over into precision strike and nuclear mission areas. The result will transform deterrence and arms race stability and lead to other significant changes. The driver behind this is a combination of long standing problems with mobile missiles along with new technologies not usually factored into strategic assessments: big data analytics, computer vision, and related information systems. When combined with drones and precision strike, the hunt for mobile missiles is becoming faster, cheaper, and better. The implications of this finding vary by country, but will shape major power nuclear modernization, crisis stability among secondary powers, and conventional attack of nuclear deterrents.
Key Words Nuclear stability  Cyber Threat 
        Export Export
7
ID:   132231


Cyberterrorism threat: findings from a survey of researchers / Jarvis, Lee; Macdonald, Stuart; Nouri, Lella   Journal Article
Jarvis, Lee Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by an imminent threat of cyberterrorism, and other, more skeptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (1) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (2) Has a cyberterrorism attack ever taken place?; and (3) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counterterrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly.
        Export Export
8
ID:   108288


Cyberwarfare: nature and content / Antonovich, P I   Journal Article
Antonovich, P I Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
9
ID:   137231


Development of countermeasures against North Korean cyberterrorism through research case studies / Yong-joon, Lee; Hyuk-jin, Kwon ; Jaeil, Lee ; Dong-kyoo, Shin   Article
Yong-joon, Lee Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This paper intends to propose countermeasures against increasingly sophisticated North Korean cyberterrorism through analysis of the cyber attack carried out by North Korea on March 20, 2013, which targeted South Korea’s major television stations and financial institutions, and also the attack of June 25, 2013, which was directed at South Korea’s government. These cyber attacks not only caused South Korea’s major television stations and banks to suffer from frozen computer terminals, but also paralyzed websites including those belonging to the Presidential Office, the Prime Minister’s Office, government institutions and local media companies. This article addresses, firstly, the reasons why cyber attacks are now targeting the websites of media companies and financial institutions, whereas in the past they were intended to paralyze the national government by means of DDoS attacks. Secondly, the article attempts to predict the kinds of attack that can be expected in the future. Thirdly, in order to ensure that there are sound defenses against the continually growing threat of cyber terrorism, the article proposes an optimal system of countermeasures, describing related regulations, response strategies, and security personnel.
        Export Export
10
ID:   126188


Establishing the first line of defence / Horne, Richard   Journal Article
Horne, Richard Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012-13.
Summary/Abstract Intrusive regulation could destroy the flexibility the private sector needs to protect itself,
Key Words Economy  Cyber Security  Cyber Threat 
        Export Export
11
ID:   123348


Estonia's cyber defence league: a model for the United States? / Cardash, Sharon L; Cilluffo, Frank J; Ottis, Rain   Journal Article
Cilluffo, Frank J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The cyber threat spectrum that prevails today is both broad and deep. While we cannot protect everything, everywhere, all the time, we can and must make a concerted and sustained effort to shore up national defenses as they pertain to cybersecurity. Despite considerable differences of scale and scope, Estonia's made-in-country cyber solutions may hold promise for the United States, at least with some adjustments and tailoring to take into account differing requirements and traditions. There may be much to learn from a country that bills itself as "e-Estonia, the digital society," and also delivers on that promise. Specifically, the country's Cyber Defence League is a concept and construct that may prove useful for the United States to consider and contemplate at a time when significant cyber threats continue to multiply, but the skilled personnel needed to counter the challenge are in short supply on the U.S. side.
        Export Export
12
ID:   133728


Hackerspaces and the internet of things in China: how makers are reinventing industrial production, innovation, and the self / Lindtner, Silvia   Journal Article
Lindtner, Silvia Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract This article discusses the visions and practices of DIY (do-it-yourself) maker culture in China. It analyses how the ideals held by DIY makers, such as openness, peer production, and individual empowerment, are formulated in relation to China's project of building a creative society and economy. To demonstrate, this article draws from long-term ethnographic research, including the setting up of China's first hackerspace, the proliferation of making, and partnerships between makers and manufacturers. China's makers are driven to reinvent what creativity, innovation, industrial production and citizenship mean today, simultaneously exploiting and challenging political rhetoric. By setting up hackerspaces, designing open technologies and starting up businesses, they craft alternative subject positions, for themselves and others. The contribution of this article is threefold. First, it fills a gap in current research by providing an account of a culture of technology production. Second, it proposes the analytical lens of 'making subjectivities' to open up the concept of the netizen, illustrating the importance for Chinese Internet research to consider not only technology use, but also the culture and materials of its production. Third, it demonstrates that maker culture is better understood as a parasitic culture rather than a counterculture, altering the system from within, contributing to our understanding of the relationship between technology use, production, society, activism and the state.
        Export Export
13
ID:   143022


Life cycles of cyber threats / Buchanan, Ben   Article
Buchanan, Ben Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Technology isn’t human, but it has stages of life. The period after the conception of a new piece of technology is often marked by significant investments of time and resources, often with little tangible return. If this work is successful, the technology begins to enter use, benefiting from iteration and design improvements. It may then begin to spread, gaining in popularity and begetting virtuous economies of scale. If all continues to progress, the technology will mature in the marketplace. Even if it attains market dominance, however, that position will not be permanent. In time, an upstart technology will appear on the scene, and the process will begin again. Sometimes the old technology will stick around in one form or another, carving out a niche role for itself. More frequently, it will be cast aside and supplanted.
        Export Export
14
ID:   068054


Managerial guide for handling cyber-terrorism and information warfare / Janczewski, Lech J; Colarik, Andrew M 2005  Book
Janczewski, Lech J Book
0 Rating(s) & 0 Review(s)
Publication Hershey, Idea Group Publishing, 2005.
Description xiv, 229p.Hbk
Standard Number 1591405831
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
050939658.478/JAN 050939MainOn ShelfGeneral 
15
ID:   152698


Moving target / Amoakohene, Kwame   Journal Article
Amoakohene, Kwame Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
16
ID:   147153


Resilience the solution to cyber terrorism / Thomas, Bindiya Carmeline   Journal Article
Thomas, Bindiya Carmeline Journal Article
0 Rating(s) & 0 Review(s)
Key Words Cyber Terrorism  Cyber Threat 
        Export Export
17
ID:   122283


Secure and connected: the JWG report recommends a public private partnership to tackle cyber security issue / Mekala, Dilip Kumar   Journal Article
Mekala, Dilip Kumar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
18
ID:   139711


Securing things: growing device connectivity affects security / Reterski, Milosz   Article
Reterski, Milosz Article
0 Rating(s) & 0 Review(s)
Key Words Internet  Security Threat  Cyber Attacks  SCADA  Cyber Threat 
        Export Export
19
ID:   129600


Sporting chancers: cyber security at international sporting events / Pritchard, Robert   Journal Article
Pritchard, Robert Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
20
ID:   132818


Virtual safeguard / Mekala, Dilip Kumar   Journal Article
Mekala, Dilip Kumar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract In the backdrop of high expectations set by Narendra Modi before the General Elections, the government's inaction in the field of cyber security seems to be extremely disappointing. It is no secret that India has been far behind in enforcing a comprehensive policy related to cyber security. Last year, the National Cyber Security Policy was released by the then UPA government which listed a broad overview of the plan of action, but it failed to provide the roadmap for implementation. All eyes are now on the National Security Advisor Ajit Doval to see how he would deal with the issue.
        Export Export
12Next