The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Telecommunications: An Awareness Document
Author
National Communications System
Key alpha
National Communications System
Publisher
National Communications System
Affiliation
US Government
Publication Date
2001-01-01
Contents
Executive Summary
1 Introduction
1.1 Overview
1.2 Scope
1.3 Report Organization
2 Background
2.1 Introduction
2.2 Telecommunications and
Information Systems
2.3 Dependence on
Telecommunications and
Information Systems
2.4 Joint Government-Industry
Activities
2.5 Electronic Intusion
3 Telecommunications and Information Systems As Intrusion Targets
3.1 Introduction
3.2 Electronice Intrusion
Vulnerabilities
3.3 Software-Based Tools and
Techniques
3.4 Trends
3.5 Potential Impact
3.6 Conclusion
4 Economic Competitor and Adversary Use of Electronic Intrusion
4.1 Introduction
4.2 Foreign States
4.3 Terrorist Use of Electronic
Intrusion
4.4 Organized Crime Use of
Electronic Intrusion
4.5 Conclusion
5 Hacker Use of Electronic Intrusion
5.1 Introduction
5.2 Hackers
5.3 Probing for Vulnerabilities
5.4 Availability of Tools
5.5 Conclusion
6 The Insider Threat to Telecommunications and Information Systems
6.1 Introduction
6.2 Insiders
6.3 Profile of a Malicious Attack
6.4 Methods of Attack
6.5 conclusion
7 Threat Analysis
7.1 Introduction
7.2 Threat Sources
7.3 Capabilities
7.4 Implications of the
Changing Threat
7.5 Impact on the Nation\'s
NS/EP Posture
8 Countering the Threat
8.1 Introduction
8.2 Countermeasures
8.3 Awareness
8.4 Infrastructure Protection
Guidance
8.5 Information Sharing
8.6 Computer Incident
Response Teams
8.7 Technology
8.8 Legal
8.9 Conclusion
Appendix A Malicious Software Descriptions
A.1 Overview
A.2 Trojan Horse
A.3 Worm
A.4 Logic Bomb
A.5 Computer Virus
A.6 Bacteria
Appendix B List of Acronyms
Appendix C Glossary
Appendix D References
Keywords
Electronic Intrusion, national security, emergency preparedness, hackers, Terrorist