This Article 
 Bibliographic References 
 Add to: 
Another Ode to Paranoia
May/June 2010 (vol. 12 no. 3)
pp. 57-59
Phil Laplante, Pennsylvania State University
Joanna DeFranco, Pennsylvania State University

As an individual, employee, and citizen, you have an important role to play in cyber defense. You likely engage in good practices to reduce the threat of malware impacting your life. But how does your other cyber behavior fit into the greater national cyber strategy?

1. "US Officials Rehearse Fending Off Cyberattack," AFP, 16 Feb. 2010, www.breitbart.comarticle.php?id=CNG.231a2854e18ee0b63877c9ffdd84d92d.591&show_article=1 .
2. P. Laplante, B. Michael, and J. Voas, "Cyberpandemics: History, Inevitability, Response," IEEE Security & Privacy, Jan./Feb. 2009, pp. 63–67.
3. J. Ryan, "During the Olympics, The Feds Will Be Reading Your Tweets—And the Blotter," ABC News, Feb. 2010; story?id=9825070.
4. S. Baker, "In the Crossfire: Critical Infrastructure in the Age of Cyber War," Mcafee, Jan. 2010; .
5. E. Nakashima, "More than 75,000 Computer Systems Hacked in one of Largest Cyber Attacks, Security Firm Says," Washington Post,19 Feb. 2010.
6. W. Agresti, "The Four Forces Shaping Cybersecurity," Computer, Feb. 2010, pp. 101–104.

Index Terms:
Cyberattack, indexed defense, scenario-based defense, and principle-based defense, information technology, security and privacy
Phil Laplante, Joanna DeFranco, "Another Ode to Paranoia," IT Professional, vol. 12, no. 3, pp. 57-59, May-June 2010, doi:10.1109/MITP.2010.82
Usage of this product signifies your acceptance of the Terms of Use.