The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Telecommunications: An Awareness Document
Page Content
Author
National Communications System
Key alpha
National Communications System
Publisher
National Communications System
Affiliation
US Government
Publication Date
2001-01-01
Contents
Executive Summary
1 Introduction
1.1 Overview
1.2 Scope
1.3 Report Organization
2 Background
2.1 Introduction
2.2 Telecommunications and
Information Systems
2.3 Dependence on
Telecommunications and
Information Systems
2.4 Joint Government-Industry
Activities
2.5 Electronic Intusion
3 Telecommunications and Information Systems As Intrusion Targets
3.1 Introduction
3.2 Electronice Intrusion
Vulnerabilities
3.3 Software-Based Tools and
Techniques
3.4 Trends
3.5 Potential Impact
3.6 Conclusion
4 Economic Competitor and Adversary Use of Electronic Intrusion
4.1 Introduction
4.2 Foreign States
4.3 Terrorist Use of Electronic
Intrusion
4.4 Organized Crime Use of
Electronic Intrusion
4.5 Conclusion
5 Hacker Use of Electronic Intrusion
5.1 Introduction
5.2 Hackers
5.3 Probing for Vulnerabilities
5.4 Availability of Tools
5.5 Conclusion
6 The Insider Threat to Telecommunications and Information Systems
6.1 Introduction
6.2 Insiders
6.3 Profile of a Malicious Attack
6.4 Methods of Attack
6.5 conclusion
7 Threat Analysis
7.1 Introduction
7.2 Threat Sources
7.3 Capabilities
7.4 Implications of the
Changing Threat
7.5 Impact on the Nation\'s
NS/EP Posture
8 Countering the Threat
8.1 Introduction
8.2 Countermeasures
8.3 Awareness
8.4 Infrastructure Protection
Guidance
8.5 Information Sharing
8.6 Computer Incident
Response Teams
8.7 Technology
8.8 Legal
8.9 Conclusion
Appendix A Malicious Software Descriptions
A.1 Overview
A.2 Trojan Horse
A.3 Worm
A.4 Logic Bomb
A.5 Computer Virus
A.6 Bacteria
Appendix B List of Acronyms
Appendix C Glossary
Appendix D References
Keywords
Electronic Intrusion, national security, emergency preparedness, hackers, Terrorist
BibTex-formatted data
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.