text
stringlengths
4
429
Moffat, James. 2003. Complexity Theory and Network Centric Warfare, Information Age Transformation Series, Command and Control
Research Program, Pentagon, Washington, DC, http://www.dodccrp.org/files/Moffat_Complexity.pdf (accessed April 1 2010).
Pernin, Christopher G. Moore., Louis R., Comanor Katherine. 2007. The Knowledge Matrix Approach to Intelligence Fusion, United
States Army and RAND Arroyo Centre, http://www.rand.org/pubs/technical_reports/TR416/ (accessed April 1 2010).
Prestov, I. 2009. Dynamic Network Analysis for Understanding Complex Systems and Processes, Defence R&D Canada - Center for
Operational Research and Analysis, Ottawa.
Field investigation - Action Research
Carey-Smith, Mark T, Karen J. Nelson, and Lauren J May. 2007.
Improving Information Security Management in Nonprofit
Organisations with Action Research,
5th Australian Information Security Management Conference. http://eprints.qut.edu.au/14346/
(accessed 01 April 2010).
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
Curle, Adam., and Trist, E. L. 1947.
Transitional Communities and Social Reconnection.
Human Relations. Vol. 1:1/2.
Jaques, Elliott. 1949.
Interpretive Group Discussion as a Method of Facilitating Social Change.
Human Relations, 2:3, 269-280.
Brien, R. 2001. Um exame da abordagem metodol
gica da pesquisa a
o [An Overview of the Methodological Approach of Action
Research]. In Roberto Richardson (Ed.), Teoria e Pr
tica da Pesquisa A
o [Theory and Practice of Action Research]. Jo
o Pessoa, Brazil:
Universidade Federal da Para
ba, http://www.web.ca/~robrien/papers/arfinal.html (accessed 01 April 2010).
Contemporary Tibet
Barnett, Robert. 2010. The Tibet Protests of Spring, 2008, China Perspectives, 2009:3, 6-24
http://chinaperspectives.revues.org/document4836.html. (accessed April 1, 2010).
Jerryson, Michael, and Mark Juergensmeyer. 2010. Buddhist Warfare, Oxford University Press: New York.
JR03-2010 Shadows in the Cloud - GLOSSARY
Glossary
0day - is an exploit for which there is no fix from the software vendor available.
Botnet - refers to a collection of compromised networked computers that can be controlled remotely by an attacker.
Beacon / beaconing / check in - attempts by a compromised computer to connect to a command and control server.
Blackhat - generally refers to a person who attempts to compromise information technology systems or networks for malicious purposes.
Cloud computing - is an emerging computing paradigm that generally refers to systems that enable network devices to access data,
services, and applications on-demand.
Command and control server - refers to the network server that sends commands to compromised computers in a botnet.
DNS (domain name system) - is a hierarchical naming system for computers, services, or any resource participating in the Internet.
DoS Attack (denial of service attack) - is an attempt to prevent users from accessing a specific computer resource, such as a Web site.
DDoS, (distributed denial of service attacks) usually involve overwhelming the targeted computer with requests so that it is no longer
able to communicate with its intended users.
HTTP (Hypertext Transfer Protocol) - is a set of standards for exchanging text, images, sound and video by means of the Internet.
IP address (Internet protocol address) - is a numerical identification assigned to devices participating in a computer network utlizing the
Internet protocol.
Malware (malicious software) - refers to software designed to carry out a malicious purpose. Varieties of malware include computer
viruses, worms, trojan horses, and spyware.
OHHDL - Office of His Holiness the Dalai Lama.
Phishing - an attack in which an attacker attempts to obtain sensitive information from an individual by masquerading as a trusted third
party. A common example of such an attack is a user receiving an email from a source that appears to be a trustworthy entity, such as
the user
s bank. Such emails often request the user to visit a website that appears to be the login page of a service they use, such as
online banking, and enter their username and password, which is then collected by the attackers and used for malicious purposes.
PRC - People
s Republic of China.
Sinkhole - Operating domain names formerly used as command and control servers.
Spear phishing - is a targeted form of phishing in which a victim is typically sent an email that appears to be from an individual or
organization they know. Usually the content of the email includes information that is relevant to the victim and includes a malicious file
attachment or link that when opened excecutes malicious code on the victim
s computer.
RiR (Regional Internet Registry) - is an organization that manages the allocation and registration of Internet number resources within a
specific geographic region.
TGIE - Tibetan Government in Exile.
TPIE - Tibetan Parliament in Exile.
Tor - is an anonymity system that defends users from traffic analysis attacks in which attackers attempt to monitor users
online
behaviour.
JR03-2010 Shadows in the Cloud - GLOSSARY
Web 2.0 - typically refers to Web-based applications and services that enable user participation, collaboration, and data sharing.
WHOIS - is a public database of all domain name registrations, which provides information on individuals who register domain names.
Whitehat - generally refers to a person who attempts to infiltrate information technology systems or networks in order to expose weakness
so they can be corrected by the system
s owners. Also known as an ethical hacker.
Defense official discloses cyberattack
washingtonpost.com /wp-dyn/content/article/2010/08/24/AR2010082406495.html
Now it is official: The most significant breach of U.S. military computers was caused by a flash drive inserted into a
U.S. military laptop on a post in the Middle East in 2008.
In an article to be published Wednesday discussing the Pentagon's cyberstrategy, Deputy Defense Secretary
William J. Lynn III says malicious code placed on the drive by a foreign intelligence agency uploaded itself onto a
network run by the U.S. military's Central Command.
"That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital
beachhead, from which data could be transferred to servers under foreign control," he says in the Foreign Affairs
article.
"It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans
into the hands of an unknown adversary."
Lynn's decision to declassify an incident that Defense officials had kept secret reflects the Pentagon's desire to raise
congressional and public concern over the threats facing U.S. computer systems, experts said.
Much of what Lynn writes in Foreign Affairs has been said before: that the Pentagon's 15,000 networks and 7 million
computing devices are being probed thousands of times daily; that cyberwar is asymmetric; and that traditional Cold
War deterrence models of assured retaliation do not apply to cyberspace, where it is difficult to identify the instigator
of an attack.
But he also presents new details about the Defense Department's cyberstrategy, including the development of ways
to find intruders inside the network. That is part of what is called "active defense."
He puts the Homeland Security Department on notice that although it has the "lead" in protecting the dot.gov and
dot.com domains, the Pentagon - which includes the ultra-secret National Security Agency - should support efforts to
protect critical industry networks.
Lynn's declassification of the 2008 incident has prompted concern among cyberexperts that he gave adversaries