The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2010 vol.12)
pp: 57-59
Phil Laplante , Pennsylvania State University
Joanna DeFranco , Pennsylvania State University
<p>As an individual, employee, and citizen, you have an important role to play in cyber defense. You likely engage in good practices to reduce the threat of malware impacting your life. But how does your other cyber behavior fit into the greater national cyber strategy?</p>
Cyberattack, indexed defense, scenario-based defense, and principle-based defense, information technology, security and privacy
Phil Laplante, Joanna DeFranco, "Another Ode to Paranoia", IT Professional, vol.12, no. 3, pp. 57-59, May/June 2010, doi:10.1109/MITP.2010.82
1. "US Officials Rehearse Fending Off Cyberattack," AFP, 16 Feb. 2010, www.breitbart.comarticle.php?id=CNG.231a2854e18ee0b63877c9ffdd84d92d.591&show_article=1 .
2. P. Laplante, B. Michael, and J. Voas, "Cyberpandemics: History, Inevitability, Response," IEEE Security & Privacy, Jan./Feb. 2009, pp. 63–67.
3. J. Ryan, "During the Olympics, The Feds Will Be Reading Your Tweets—And the Blotter," ABC News, Feb. 2010; story?id=9825070.
4. S. Baker, "In the Crossfire: Critical Infrastructure in the Age of Cyber War," Mcafee, Jan. 2010; .
5. E. Nakashima, "More than 75,000 Computer Systems Hacked in one of Largest Cyber Attacks, Security Firm Says," Washington Post,19 Feb. 2010.
6. W. Agresti, "The Four Forces Shaping Cybersecurity," Computer, Feb. 2010, pp. 101–104.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool