This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Another Ode to Paranoia
May/June 2010 (vol. 12 no. 3)
pp. 57-59
Phil Laplante, Pennsylvania State University
Joanna DeFranco, Pennsylvania State University

As an individual, employee, and citizen, you have an important role to play in cyber defense. You likely engage in good practices to reduce the threat of malware impacting your life. But how does your other cyber behavior fit into the greater national cyber strategy?

1. "US Officials Rehearse Fending Off Cyberattack," AFP, 16 Feb. 2010, www.breitbart.comarticle.php?id=CNG.231a2854e18ee0b63877c9ffdd84d92d.591&show_article=1 .
2. P. Laplante, B. Michael, and J. Voas, "Cyberpandemics: History, Inevitability, Response," IEEE Security & Privacy, Jan./Feb. 2009, pp. 63–67.
3. J. Ryan, "During the Olympics, The Feds Will Be Reading Your Tweets—And the Blotter," ABC News, Feb. 2010; http://abcnews.go.com/Blotter/olympics-feds-reading-tweets story?id=9825070.
4. S. Baker, "In the Crossfire: Critical Infrastructure in the Age of Cyber War," Mcafee, Jan. 2010; http://resources.mcafee.com/contentNACIPReport .
5. E. Nakashima, "More than 75,000 Computer Systems Hacked in one of Largest Cyber Attacks, Security Firm Says," Washington Post,19 Feb. 2010.
6. W. Agresti, "The Four Forces Shaping Cybersecurity," Computer, Feb. 2010, pp. 101–104.

Index Terms:
Cyberattack, indexed defense, scenario-based defense, and principle-based defense, information technology, security and privacy
Citation:
Phil Laplante, Joanna DeFranco, "Another Ode to Paranoia," IT Professional, vol. 12, no. 3, pp. 57-59, May-June 2010, doi:10.1109/MITP.2010.82
Usage of this product signifies your acceptance of the Terms of Use.