The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2010 vol.12)
pp: 57-59
Phil Laplante , Pennsylvania State University
ABSTRACT
<p>As an individual, employee, and citizen, you have an important role to play in cyber defense. You likely engage in good practices to reduce the threat of malware impacting your life. But how does your other cyber behavior fit into the greater national cyber strategy?</p>
INDEX TERMS
Cyberattack, indexed defense, scenario-based defense, and principle-based defense, information technology, security and privacy
CITATION
Phil Laplante, "Another Ode to Paranoia", IT Professional, vol.12, no. 3, pp. 57-59, May/June 2010, doi:10.1109/MITP.2010.82
REFERENCES
1. "US Officials Rehearse Fending Off Cyberattack," AFP, 16 Feb. 2010, www.breitbart.comarticle.php?id=CNG.231a2854e18ee0b63877c9ffdd84d92d.591&show_article=1 .
2. P. Laplante, B. Michael, and J. Voas, "Cyberpandemics: History, Inevitability, Response," IEEE Security & Privacy, Jan./Feb. 2009, pp. 63–67.
3. J. Ryan, "During the Olympics, The Feds Will Be Reading Your Tweets—And the Blotter," ABC News, Feb. 2010; http://abcnews.go.com/Blotter/olympics-feds-reading-tweets story?id=9825070.
4. S. Baker, "In the Crossfire: Critical Infrastructure in the Age of Cyber War," Mcafee, Jan. 2010; http://resources.mcafee.com/contentNACIPReport .
5. E. Nakashima, "More than 75,000 Computer Systems Hacked in one of Largest Cyber Attacks, Security Firm Says," Washington Post,19 Feb. 2010.
6. W. Agresti, "The Four Forces Shaping Cybersecurity," Computer, Feb. 2010, pp. 101–104.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool