- Gorman, S. Cyber combat: Act of war. Wall Street Journal (May 31, 2011); http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html#ixzz109BF3ADz.Google Scholar
- Mahnaimi, U. Israeli military plots to cripple Iran in cyberspace. Sunday Times (Aug. 7, 2011).Google Scholar
- Markoff, J. A code for chaos. New York Times (Oct. 2, 2010); http://www.nytimes.com/2010/10/03/weekinreview/03markoff.html?ref=stuxnet.Google Scholar
- National Research Council. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, National Academies Press, 2010; http://www.nap.edu/openbook.php?record_id=12886&page=1.Google Scholar
- National Research Council. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, W.A. Owens, K.W. Dam, and H.S. Lin, Eds., National Academies Press, 2009; http://www.nap.edu/catalog.php?record_id=12651. Google ScholarDigital Library
- Reed, T.C. At the Abyss: An Insider's History of the Cold War. Ballantine Books, New York, 2004.Google Scholar
- White House. International Strategy for Cyberspace, May 2011; http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf.Google Scholar
Index Terms
- Why computer scientists should care about cyber conflict and U.S. national security policy
Recommendations
Government regulations in cyber security: Framework, standards and recommendations
AbstractCyber security refers to the protection of Internet-connected systems, such as hardware, software as well as data (information) from cyber attacks (adversaries). A cyber security regulation is needed in order to protect information ...
Highlights- We list and discuss the cyber attacks, security requirements and measures. We then discuss the cyber security incident management framework and its various ...
Comments