Query Result Set
Skip Navigation Links
   ActiveUsers:1462Hits:18361218Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER VULNERABILITY (2) answer(s).
 
SrlItem
1
ID:   108288


Cyberwarfare: nature and content / Antonovich, P I   Journal Article
Antonovich, P I Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
2
ID:   134898


Operational levels of cyber intelligence / Mattern, Troy; Felker, John; Borum, Randy; Bamford, George   Article
Borum, Randy Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Managing these economic and national security hazards in cyberspace has been a vexing problem. 6 Most discourse about cybersecurity solutions has focused on defensive measures, mainly ways to protect the perimeter around sensitive data, information, and systems. Network and system administrators worry about reacting to network intrusions and compromises so that system downtime is minimized and usage can be continued with minimal interruption. While improving network security and information assurance technology may be necessary, these measures are not sufficient to counter the complex and evolving array of cyber threats. Because current reactive approaches are not working, fundamentally changing how to understand and operate in cyberspace is necessary. 7 A transformed approach to cybersecurity cannot rely solely on responding to known threats; it must also track the capabilities, intentions, and activities of potential adversaries and competitors, as they evolve, in the cyber realm. 8 That set of information and associated functions is referred to as Cyber Intelligence.
        Export Export