Correspondence: Debating the Chinese Cyber Threat

نویسنده

  • Jon R. Lindsay
چکیده

Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Training organizational supervisors to detect and prevent cyber insider threats: two approaches

Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instru...

متن کامل

Threat Visibility for Cyber Hunters

Multiple branches of the United States military, spearheaded by United States Cyber Command, have embraced threat hunting as a way to defend against more sophisticated adversaries. This white paper explains how Cyber Protection Teams (CPTs) can use wire data to automate detection, speed investigations, and improve the granularity and collection of information. The paper includes examples of thr...

متن کامل

A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intellige...

متن کامل

Graph-theoretic characterization of cyber-threat infrastructures

In this paper, we investigate cyber-threats and the underlying infrastructures. More precisely, we detect and analyze cyber-threat infrastructures for the purpose of unveiling key players (owners, domains, IPs, organizations, malware families, etc.) and the relationships between these players. To this end, we propose metrics to measure the badness of different infrastructure elements using grap...

متن کامل

Cyber-Terror– Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate

For some years, experts and government officials have warned of cyber-terrorism as a looming threat to national security. However, if we define cyber-terror as an attack or series of attacks that is carried out by terrorists, that instills fear by effects that are destructive or disruptive, and that has a political, religious, or ideological motivation, then none of the disruptive cyber-inciden...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015