Inicio Nosotros Búsquedas
Buscar en nuestra Base de Datos:     
Título: =CYBER DEFENSE: ART TO SCIENCE
2 registros cumplieron la condición especificada en la base de información BIBCYT. ()
Registro 1 de 2, Base de información BIBCYT
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Saydjari, O., Sami
Título: CYBER DEFENSE: ART TO SCIENCE
Páginas/Colación: pp.53-57; 28 cm; il
Communications of the ACM Vol. 4, no. 3 March 2004
Información de existenciaInformación de existencia
Registro 2 de 2, Base de información BIBCYT
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Saydjari O., Sami ssaydjari@CyberDefenseAgency.com
Oprima aquí para enviar un correo electrónico a esta dirección
Título: CYBER DEFENSE: ART TO SCIENCE
Páginas/Colación: pp.53-57; 28 cm; il
Url: Ir a http://web1.epnet.com/citation.asp?tb=1&_ua=%5F1&_ug=sid+CA9C9735%2D4317%2D426A%2DB3F2%2DE17FB82620F4%40sessionmgr5+dbs+aph+cp+1+0D2E&_us=fcl+Aut+hs+True+cst+0%3B1%3B2+or+Date+ss+SO+sm+KS+sl+http://web1.epnet.com/citation.asp?tb=1&_ua=%5F1&_ug=sid+CA9C9735%2D4317%2D426A%2DB3F2%2DE17FB82620F4%40sessionmgr5+dbs+aph+cp+1+0D2E&_us=fcl+Aut+hs+True+cst+0%3B1%3B2+or+Date+ss+SO+sm+KS+sl+
Communications of the ACM Vol. 4, no. 3 March 2004
Información de existenciaInformación de existencia

Resumen
This article focuses on the cyber attacks and its understanding on networked computer resources. Cyber attacks are becoming sophisticated, attackers routinely use attack design toolkits, apply stealth techniques and target an increasing spectrum of protocols and applications. Cyber attackers are learning to actively evade countermeasures. Moreover, attackers have the advantage because they can carefully plan and choose the best time and the weakest points at which to attack. To effectively manage all the defensive elements, one needs strategy and tactics. To develop strategy and tactics hypotheses based on analogy has to be accumulated. To achieve a viable cyber defense capability, many advances in both science and technology are needed. Sound cyber defense policy depends on understanding the problem, its solution and the nature of cyber conflicts from economics, behavioral and political perspectives. Computer security has its roots in the requirement for multilevel security processing. The need continues for controlled sharing among groups of differing trust relationships

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

UCLA - Biblioteca de Ciencias y Tecnologia Felix Morales Bueno

Generados por el servidor 'bibcyt.ucla.edu.ve' (3.141.29.145)
Adaptive Server Anywhere (07.00.0000)
ODBC
Sesión="" Sesión anterior=""
ejecutando Back-end Alejandría BE 7.0.7b0 ** * *
3.141.29.145 (NTM) bajo el ambiente Apache/2.2.4 (Win32) PHP/5.2.2.
usando una conexión ODBC (RowCount) al manejador de bases de datos..
Versión de la base de información BIBCYT: 7.0.0 (con listas invertidas [2.0])

Cliente: 3.141.29.145
Salida con Javascript


** Back-end Alejandría BE 7.0.7b0 *