Description
The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these information systems has made common desktop software, infrastructure services, and information networks increasingly vulnerable to continuous and innovative breakers of security. Worms, viruses, and spam are examples of attacks that cost the global economy billions of dollars in lost productivity. Sophisticated distributed denial of service (DDoS) attacks that use thousands of web robots (bots) on the Internet and telecommunications networks are on the rise. The ramifications of these attacks are clear: the potential for a devastating, large-scale network failure, service interruption, or the total unavailability of service. This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It covers not only strategy and policy issues, but also the social, legal, and technical aspects of cyber security as well.
Chapter
SECTION 5. THE ROLE OF CYBERPOWER IN HUMANITARIAN ASSISTANCE/DISASTER RELIEF (HA/DR) AND STABILITY AND RECONSTRUCTION OPERATIONS
Role of Cyber and Challenges
Commercial ICT Capability Packages
ICT Strategy for Stability and Reconstruction Operations-Afghanistan Example
PART II: SOCIAL AND LEGAL ASPECTS
SECTION 6. THE INFORMATION POLITY: SOCIAL AND LEGAL FRAMEWORKS FOR CRITICAL CYBER INFRASTRUCTURE PROTECTION
Jurisdiction among Distributed Sovereigns
Local Substantive Criminal Law and the Exercise of Sovereignty
A Transnational Legal Regime and Cooperation across Frontiers—The Convention on Cybercrime
Social Norms and Criminological Theory
Administrative Engagement— Marshalling and Enabling ExistingLaw Enforcement
SECTION 7. THE ATTACK DYNAMICS OF POLITICAL AND RELIGIOUSLY MOTIVATED HACKERS
Discussion and Conclusion
PART III: TECHNICAL ASPECTS
SECTION 8. RESILIENCE OF DATA CENTERS
SECTION 9. DEVELOPING HIGH FIDELITY SENSORS FOR INTRUSION ACTIVITY ON ENTERPRISE NETWORKS
SECTION 10. VOICE OVER IP: RISKS, THREATS, AND VULNERABILITIES
VOIP Technologies Overview
SECTION 11. TOWARD FOOLPROOF IP NETWORK CONFIGURATION ASSESSMENTS
Configuration Errors Found in Operational IP Networks
Regulators Expect Compliance
Many Assessment Approaches Prove Deficient
Toward a Solution That Works
SECTION 12. ON THE NEW BREED OF DENIAL OF SERVICE (DOS) ATTACKS IN THE INTERNET
Traditional Brute Force Attacks
New Breed of Stealthy DoS Attacks
Future Research Directions
Chapter 2: CYBER INFRASTRUCTURE PROTECTION: VOLUME II
Economics and Social Aspects of Cyber Security
PART I: ECONOMICS AND SOCIAL ASPECTS OF CYBER SECURITY
SECTION 2. EXPLORING THE ECONOMICS OF THE MALICIOUS SOFTWARE MARKET
Hacking, Malware Markets, and the Economic Impact of Cybercrime
Discussion and Conclusion
SECTION 3. THE EMERGENCE OF THE CIVILIAN CYBER WARRIOR
The Emergence of the Civilian Cyber Warrior
PART II. LAW AND CYBERCRIME
SECTION 4. CHANGING THE GAME: SOCIAL AND JUSTICE MODELS FOR ENHANCED CYBER SECURITY
Social and Education Models
SECTION 5. CYBER SECURITY AND IDENTITY: SOLUTIONS FOR CRITICIAL INFRASTRUCUTURE THAT PROTECT CIVIL LIBERTIES AND ENHANCE SECURITY
Introduction: Identity Problems and Identity Values
Authentication and Attribution: Identifying the Communicant
Identity and the Internet: How Authentication and Attribution Work in Practice, and What Concerns Current Solutions Raise
Proposed Solutions to Cyber Security Identity Problems: Weighing the Options
SECTION 6. EXPLORING THE UTILITY OF OPEN SOURCE DATA TO PREDICT MALICIOUS SOFTWARE CREATION
Theorizing the Structural Correlates of Malware Creation
Count Data Issues: The Zero-Inflated Negative Binomial Model
Discussion and Conclusions
PART III: CYBER INFRASTRUCTURE
SECTION 7. ISP GRADE THREAT MONITORING
Security Monitoring System
Profile Anomaly Detection
SECTION 8. THE CHALLEGES ASSOCIATED WITH ASSESSING CYBER ISSUES
Decomposition of the Problem
Measures of Merit for Cyber Issues
Existing Cyber Assessment Capabilities
Needed Cyber Assessment Capabilities
APPENDIX I. ABBREVIATIONS AND ACRONYMS