Cyber Infrastructure Protection
ARMY WAR COLL STRATEGIC STUDIES INST CARLISLE BARRACKS PA
Pagination or Media Count:
This book is intended to address important issues in the security and protection of information systems and network infrastructure. This includes the strategic implications of the potential failure of our critical network and information systems infrastructure identifying critical infrastructure networks and services analysis and risk assessment of current network and information systems infrastructure classification of network infrastructure attacks automating the management of infrastructure security and building defense systems to proactively detect network attacks as soon as possible once they have been initiated. The chapters in this book are the result of invited presentations in a 2-day conference on cyber infrastructure protection held at the City University of New York, City College, on June 4-5, 2009.1 The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security and provides discussions covering the theory of cyberpower, Internet survivability, large scale data breaches, and the role of cyberpower in humanitarian assistance. Part 2 covers social and legal aspects of cyber infrastructure protection and discusses the attack dynamics of political and religiously motivated hackers. Part 3 discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong emphasis on Internet protocol IP networks.
- Computer Systems Management and Standards