The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

The Electronic Intrusion Threat to National Security and Emergency Preparedness (NS/EP) Telecommunications: An Awareness Document

Author

National Communications System

Entry type

article

Date

1999 – March

Key alpha

National Communications System

Publisher

National Communications System

Affiliation

US Government

Publication Date

2001-01-01

Contents

Executive Summary 1 Introduction 1.1 Overview 1.2 Scope 1.3 Report Organization 2 Background 2.1 Introduction 2.2 Telecommunications and Information Systems 2.3 Dependence on Telecommunications and Information Systems 2.4 Joint Government-Industry Activities 2.5 Electronic Intusion 3 Telecommunications and Information Systems As Intrusion Targets 3.1 Introduction 3.2 Electronice Intrusion Vulnerabilities 3.3 Software-Based Tools and Techniques 3.4 Trends 3.5 Potential Impact 3.6 Conclusion 4 Economic Competitor and Adversary Use of Electronic Intrusion 4.1 Introduction 4.2 Foreign States 4.3 Terrorist Use of Electronic Intrusion 4.4 Organized Crime Use of Electronic Intrusion 4.5 Conclusion 5 Hacker Use of Electronic Intrusion 5.1 Introduction 5.2 Hackers 5.3 Probing for Vulnerabilities 5.4 Availability of Tools 5.5 Conclusion 6 The Insider Threat to Telecommunications and Information Systems 6.1 Introduction 6.2 Insiders 6.3 Profile of a Malicious Attack 6.4 Methods of Attack 6.5 conclusion 7 Threat Analysis 7.1 Introduction 7.2 Threat Sources 7.3 Capabilities 7.4 Implications of the Changing Threat 7.5 Impact on the Nation\'s NS/EP Posture 8 Countering the Threat 8.1 Introduction 8.2 Countermeasures 8.3 Awareness 8.4 Infrastructure Protection Guidance 8.5 Information Sharing 8.6 Computer Incident Response Teams 8.7 Technology 8.8 Legal 8.9 Conclusion Appendix A Malicious Software Descriptions A.1 Overview A.2 Trojan Horse A.3 Worm A.4 Logic Bomb A.5 Computer Virus A.6 Bacteria Appendix B List of Acronyms Appendix C Glossary Appendix D References

Keywords

Electronic Intrusion, national security, emergency preparedness, hackers, Terrorist

Language

English

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.