Cyber Infrastructure Protection: Selected Issues and Analyses

Author: Howard C. Collins and Connor R. Hughes  

Publisher: Nova Science Publishers, Inc.‎

Publication year: 2014

E-ISBN: 9781628085822

Subject: TP309 安全保密

Keyword: Internet

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these information systems has made common desktop software, infrastructure services, and information networks increasingly vulnerable to continuous and innovative breakers of security. Worms, viruses, and spam are examples of attacks that cost the global economy billions of dollars in lost productivity. Sophisticated distributed denial of service (DDoS) attacks that use thousands of web robots (bots) on the Internet and telecommunications networks are on the rise. The ramifications of these attacks are clear: the potential for a devastating, large-scale network failure, service interruption, or the total unavailability of service. This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It covers not only strategy and policy issues, but also the social, legal, and technical aspects of cyber security as well.

Chapter

Concluding Remarks

SECTION 5. THE ROLE OF CYBERPOWER IN HUMANITARIAN ASSISTANCE/DISASTER RELIEF (HA/DR) AND STABILITY AND RECONSTRUCTION OPERATIONS

Introduction

Role of Cyber and Challenges

Commercial ICT Capability Packages

ICT Strategy for Stability and Reconstruction Operations-Afghanistan Example

Observations

PART II: SOCIAL AND LEGAL ASPECTS

SECTION 6. THE INFORMATION POLITY: SOCIAL AND LEGAL FRAMEWORKS FOR CRITICAL CYBER INFRASTRUCTURE PROTECTION

Introduction

Jurisdiction among Distributed Sovereigns

Local Substantive Criminal Law and the Exercise of Sovereignty

A Transnational Legal Regime and Cooperation across Frontiers—The Convention on Cybercrime

Social Norms and Criminological Theory

Administrative Engagement— Marshalling and Enabling ExistingLaw Enforcement

Citizen Engagement

Conclusion

SECTION 7. THE ATTACK DYNAMICS OF POLITICAL AND RELIGIOUSLY MOTIVATED HACKERS

Introduction

Data and Method

Findings

Discussion and Conclusion

PART III: TECHNICAL ASPECTS

SECTION 8. RESILIENCE OF DATA CENTERS

Introduction

State of the Art

Conclusion

SECTION 9. DEVELOPING HIGH FIDELITY SENSORS FOR INTRUSION ACTIVITY ON ENTERPRISE NETWORKS

Introduction

Current Issues

The Virtual Environment

Conclusions

SECTION 10. VOICE OVER IP: RISKS, THREATS, AND VULNERABILITIES

Introduction

VOIP Technologies Overview

VoIP Threats

Discussion

Conclusion

SECTION 11. TOWARD FOOLPROOF IP NETWORK CONFIGURATION ASSESSMENTS

Introduction

Configuration Errors Found in Operational IP Networks

Reliability

Regulators Expect Compliance

Many Assessment Approaches Prove Deficient

Toward a Solution That Works

Summary

SECTION 12. ON THE NEW BREED OF DENIAL OF SERVICE (DOS) ATTACKS IN THE INTERNET

Introduction

Traditional Brute Force Attacks

New Breed of Stealthy DoS Attacks

Defense Systems

Future Research Directions

Conclusion

About the Contributors

End Notes

Chapter 2: CYBER INFRASTRUCTURE PROTECTION: VOLUME II

FOREWORD

SECTION 1. INTRODUCTION

Outline of the Report

Economics and Social Aspects of Cyber Security

Law and Cybercrime

Cyber Infrastructure

PART I: ECONOMICS AND SOCIAL ASPECTS OF CYBER SECURITY

SECTION 2. EXPLORING THE ECONOMICS OF THE MALICIOUS SOFTWARE MARKET

Introduction

Overview

Hacking, Malware Markets, and the Economic Impact of Cybercrime

Findings

Discussion and Conclusion

SECTION 3. THE EMERGENCE OF THE CIVILIAN CYBER WARRIOR

Introduction

Theoretical Background

The Emergence of the Civilian Cyber Warrior

Methodology

Results and Discussion

CONCLUSION

PART II. LAW AND CYBERCRIME

SECTION 4. CHANGING THE GAME: SOCIAL AND JUSTICE MODELS FOR ENHANCED CYBER SECURITY

Introduction

Criminal Justice Models

Social and Education Models

Future Directions

Conclusion

SECTION 5. CYBER SECURITY AND IDENTITY: SOLUTIONS FOR CRITICIAL INFRASTRUCUTURE THAT PROTECT CIVIL LIBERTIES AND ENHANCE SECURITY

Introduction: Identity Problems and Identity Values

Authentication and Attribution: Identifying the Communicant

Identity and the Internet: How Authentication and Attribution Work in Practice, and What Concerns Current Solutions Raise

Proposed Solutions to Cyber Security Identity Problems: Weighing the Options

Conclusion

SECTION 6. EXPLORING THE UTILITY OF OPEN SOURCE DATA TO PREDICT MALICIOUS SOFTWARE CREATION

Introduction

Literature Review

Theorizing the Structural Correlates of Malware Creation

The Present Study

Dependent Variable

Independent Variables

Count Data Issues: The Zero-Inflated Negative Binomial Model

Findings

Discussion and Conclusions

PART III: CYBER INFRASTRUCTURE

SECTION 7. ISP GRADE THREAT MONITORING

Introduction

Monitoring for Threats

Security Monitoring System

Secure Anomaly Detection

Profile Anomaly Detection

Volume Anomaly Detection

Anomaly Correlation

CONCLUSION

SECTION 8. THE CHALLEGES ASSOCIATED WITH ASSESSING CYBER ISSUES

Introduction

Decomposition of the Problem

Key Cyber Policy Issues

Measures of Merit for Cyber Issues

Existing Cyber Assessment Capabilities

Needed Cyber Assessment Capabilities

CONCLUSION

APPENDIX I. ABBREVIATIONS AND ACRONYMS

ABOUT THE CONTRIBUTORS

INDEX

The users who browse this book also browse


No browse record.