Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Buy Now $4.95
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
1Activity

Table Of Contents

Introduction
A Bit of History
The Interminable War
The Basic Challenges
The Internet: Target One
Information Half Life
The Constantly Changing Face of War
A Sample Exercise
Understanding the Threats
The Battlefield
The Network
The Weapons
Our Enemies
Criminal Elements
Employees
Fanatics and Terrorists
Hackers and Crackers
Hostile Governments
Our Allies
Process
Time
Anticipation
The Reinforcements
Basic Training for War
The Handicaps
Lack of Qualified Personnel
The Price of Openness
The Endless Stream of Changes
A Key Conflict of Interest
Liability
The Spoils of War
A War Capable and Worth Winning
A New Battlefield
Moving from Reactive to Proactive
Limiting the Damage from Attacks
Obfuscation
Conclusions
Appendix A - Summary of the Key Security Axioms
Appendix B - Three Weeks of Vulnerabilities
Appendix C - Survey of Major Internet Attacks
0 of .
Results for:
No results containing your search query
P. 1
The Abilene Net

The Abilene Net

Ratings: (0)|Views: 146|Likes:
Published by AuthorHouseBooks


Internet
usage over the last decade has exploded. 
Yet every day, we are seeing more and more compromises of information which is attached to the Internet. The Abilene Net explores why it is strategically impossible to fully and permanently protect information which is accessible through the Internet and proposes an alternative approach to electronic commerce.   The Abilene Net contrasts and compares the
current cyber war with traditional warfare and discusses a variety of issues
associated with transmitting sensitive information over an open network which
is accessible to virtually everyone.  The
book defines a series of security axioms and strategies to be considered when
implementing a layered security model, recommending fundamental changes in our strategies associated with the exchange of sensitive information.  The Abilene Net is a must read for CEOs,
CFOs, CIOs, CTOs, and other
corporate officers who will be held increasingly responsible for protecting
their company’s information resources and the information of their customers.



Internet
usage over the last decade has exploded. 
Yet every day, we are seeing more and more compromises of information which is attached to the Internet. The Abilene Net explores why it is strategically impossible to fully and permanently protect information which is accessible through the Internet and proposes an alternative approach to electronic commerce.   The Abilene Net contrasts and compares the
current cyber war with traditional warfare and discusses a variety of issues
associated with transmitting sensitive information over an open network which
is accessible to virtually everyone.  The
book defines a series of security axioms and strategies to be considered when
implementing a layered security model, recommending fundamental changes in our strategies associated with the exchange of sensitive information.  The Abilene Net is a must read for CEOs,
CFOs, CIOs, CTOs, and other
corporate officers who will be held increasingly responsible for protecting
their company’s information resources and the information of their customers.

More info:

Publish date: May 1, 2004
Added to Scribd: Feb 06, 2013
Copyright:Traditional Copyright: All rights reservedISBN:9781418473921
List Price: $4.95 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
Buy the full version from:Amazon
See more
See less

03/11/2014

246

9781418473921

$4.95

USD

pdf

You're Reading a Free Preview
Pages 10 to 119 are not shown in this preview.
You're Reading a Free Preview
Pages 129 to 141 are not shown in this preview.
You're Reading a Free Preview
Pages 151 to 167 are not shown in this preview.
You're Reading a Free Preview
Pages 183 to 246 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->