Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues

نویسنده

  • Howard F. Lipson
چکیده

..................................................................................................................ix Part I: Technical Challenges in Tracking and Tracing Cyber-Attacks ..................1

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How Can We Deter Cyber Terrorism?

Jian Hua1 and Sanjay Bapna2 1School of Business and Public Administration, University of the District of Columbia, Washington, D.C., USA 2Morgan State University, Baltimore, Maryland, USA ABSTRACT In order to deter cyber terrorism, it is important to identify the terrorists, since punishment may not deter them. The identification probability relies heavily on tracking cyber terrorists. However,...

متن کامل

Analysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic

The COVID-19 pandemic was a remarkable and unprecedented event that changed the lives of billions of citizens around the world and resulted in what is known as a new term in terms of social norms and lifestyles. In addition to the tremendous impact on society and business in general, the epidemic created a unique set of cybercrime circumstances that also affected society and business. Increased...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification

Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...

متن کامل

A New Gilded Age, and What It Means for Global Health; Comment on “Global Health Governance Challenges 2016 – Are We Ready?”

New contours of global inequality present new challenges for global health, and require that we consider new kinds of health issues as global. I provide a number of illustrations, arguing the need for a political science of health that goes beyond conventional preoccupations with formal institutional and interstate interactions and takes into account how globalization has affected the health po...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002