World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Before the Subcommittee on Emerging Threats and Capabilities Committee on Armed Services United States Senate

By Faga, Martin C.

Click here to view

Book Id: WPLBN0000142964
Format Type: PDF eBook
File Size: 0.1 MB
Reproduction Date: 2008
Full Text

Title: Before the Subcommittee on Emerging Threats and Capabilities Committee on Armed Services United States Senate  
Author: Faga, Martin C.
Volume:
Language: English
Subject: Government publications, Legislation., Government Printing Office (U.S.)
Collections: Government Library Collection
Historic
Publication Date:
Publisher: Government Printing Office

Citation

APA MLA Chicago

Faga, M. C. (n.d.). Before the Subcommittee on Emerging Threats and Capabilities Committee on Armed Services United States Senate. Retrieved from http://hawaiilibrary.net/


Excerpt
Excerpt: To deal with emerging threats to our information infrastructure, of which the recent e-commerce attacks are only a precursor, we need to leverage the knowledge and experience of the Department of Defense and the broader national security community. MITRE has been working issues of computer network security for more than 30 years. We have some 450 technical staff providing cyber-security support to a wide variety of Government agencies and activities, particularly the Department of Defense and many of its Agencies, all the Military Services, and the Intelligence Community. My testimony today draws upon what we have learned over many years of supporting these information security activities. We have all had our attention heightened by the recent denial of service attacks. While there are new tools such as TFN (believe it or not, Teletubbies Flood Network) that make these attacks more powerful and easier to launch, denial-of-service attacks are nothing new. What is new is that these targets are high-profile e-commerce sites. As the Internet becomes increasingly important to our economy, its vulnerabilities--even to relatively unsophisticated attacks--become increasingly significant. But I'm more concerned about the sophisticated, dynamic attacks that are technically possible today and increasingly likely to occur in the future. I say this because we do it--we mount sophisticated, professional cyber attacks in exercises so that we can learn about the challenges that defenders face. And we know from both classified and open sources that others are working on such sophisticated attacks as well.

Table of Contents
Na

 

Click To View

Additional Books


  • Acknowledgments (by )
  • Nrp Overview of Mission -Based Budgeting 
  • In the United States District Court for ... (by )
  • Credits (by )
  • Appendix a : Chronological List of Vice ... 
  • Dod Information Security Program 
  • Richard Milhous Nixon (by )
  • Art and Photo Credits 
  • The Performance of the Intelligence Comm... 
  • World Wide Web Sites Reported by Federal... 
  • Giuseppe Garibaldi (by )
  • Guidelines for Contractors Holding Press... 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.