text
stringlengths 4
429
|
---|
Moffat, James. 2003. Complexity Theory and Network Centric Warfare, Information Age Transformation Series, Command and Control
|
Research Program, Pentagon, Washington, DC, http://www.dodccrp.org/files/Moffat_Complexity.pdf (accessed April 1 2010).
|
Pernin, Christopher G. Moore., Louis R., Comanor Katherine. 2007. The Knowledge Matrix Approach to Intelligence Fusion, United
|
States Army and RAND Arroyo Centre, http://www.rand.org/pubs/technical_reports/TR416/ (accessed April 1 2010).
|
Prestov, I. 2009. Dynamic Network Analysis for Understanding Complex Systems and Processes, Defence R&D Canada - Center for
|
Operational Research and Analysis, Ottawa.
|
Field investigation - Action Research
|
Carey-Smith, Mark T, Karen J. Nelson, and Lauren J May. 2007.
|
Improving Information Security Management in Nonprofit
|
Organisations with Action Research,
|
5th Australian Information Security Management Conference. http://eprints.qut.edu.au/14346/
|
(accessed 01 April 2010).
|
JR03-2010 Shadows in the Cloud - BIBLIOGRAPHY & SUGGESTED READINGS
|
Curle, Adam., and Trist, E. L. 1947.
|
Transitional Communities and Social Reconnection.
|
Human Relations. Vol. 1:1/2.
|
Jaques, Elliott. 1949.
|
Interpretive Group Discussion as a Method of Facilitating Social Change.
|
Human Relations, 2:3, 269-280.
|
Brien, R. 2001. Um exame da abordagem metodol
|
gica da pesquisa a
|
o [An Overview of the Methodological Approach of Action
|
Research]. In Roberto Richardson (Ed.), Teoria e Pr
|
tica da Pesquisa A
|
o [Theory and Practice of Action Research]. Jo
|
o Pessoa, Brazil:
|
Universidade Federal da Para
|
ba, http://www.web.ca/~robrien/papers/arfinal.html (accessed 01 April 2010).
|
Contemporary Tibet
|
Barnett, Robert. 2010. The Tibet Protests of Spring, 2008, China Perspectives, 2009:3, 6-24
|
http://chinaperspectives.revues.org/document4836.html. (accessed April 1, 2010).
|
Jerryson, Michael, and Mark Juergensmeyer. 2010. Buddhist Warfare, Oxford University Press: New York.
|
JR03-2010 Shadows in the Cloud - GLOSSARY
|
Glossary
|
0day - is an exploit for which there is no fix from the software vendor available.
|
Botnet - refers to a collection of compromised networked computers that can be controlled remotely by an attacker.
|
Beacon / beaconing / check in - attempts by a compromised computer to connect to a command and control server.
|
Blackhat - generally refers to a person who attempts to compromise information technology systems or networks for malicious purposes.
|
Cloud computing - is an emerging computing paradigm that generally refers to systems that enable network devices to access data,
|
services, and applications on-demand.
|
Command and control server - refers to the network server that sends commands to compromised computers in a botnet.
|
DNS (domain name system) - is a hierarchical naming system for computers, services, or any resource participating in the Internet.
|
DoS Attack (denial of service attack) - is an attempt to prevent users from accessing a specific computer resource, such as a Web site.
|
DDoS, (distributed denial of service attacks) usually involve overwhelming the targeted computer with requests so that it is no longer
|
able to communicate with its intended users.
|
HTTP (Hypertext Transfer Protocol) - is a set of standards for exchanging text, images, sound and video by means of the Internet.
|
IP address (Internet protocol address) - is a numerical identification assigned to devices participating in a computer network utlizing the
|
Internet protocol.
|
Malware (malicious software) - refers to software designed to carry out a malicious purpose. Varieties of malware include computer
|
viruses, worms, trojan horses, and spyware.
|
OHHDL - Office of His Holiness the Dalai Lama.
|
Phishing - an attack in which an attacker attempts to obtain sensitive information from an individual by masquerading as a trusted third
|
party. A common example of such an attack is a user receiving an email from a source that appears to be a trustworthy entity, such as
|
the user
|
s bank. Such emails often request the user to visit a website that appears to be the login page of a service they use, such as
|
online banking, and enter their username and password, which is then collected by the attackers and used for malicious purposes.
|
PRC - People
|
s Republic of China.
|
Sinkhole - Operating domain names formerly used as command and control servers.
|
Spear phishing - is a targeted form of phishing in which a victim is typically sent an email that appears to be from an individual or
|
organization they know. Usually the content of the email includes information that is relevant to the victim and includes a malicious file
|
attachment or link that when opened excecutes malicious code on the victim
|
s computer.
|
RiR (Regional Internet Registry) - is an organization that manages the allocation and registration of Internet number resources within a
|
specific geographic region.
|
TGIE - Tibetan Government in Exile.
|
TPIE - Tibetan Parliament in Exile.
|
Tor - is an anonymity system that defends users from traffic analysis attacks in which attackers attempt to monitor users
|
online
|
behaviour.
|
JR03-2010 Shadows in the Cloud - GLOSSARY
|
Web 2.0 - typically refers to Web-based applications and services that enable user participation, collaboration, and data sharing.
|
WHOIS - is a public database of all domain name registrations, which provides information on individuals who register domain names.
|
Whitehat - generally refers to a person who attempts to infiltrate information technology systems or networks in order to expose weakness
|
so they can be corrected by the system
|
s owners. Also known as an ethical hacker.
|
Defense official discloses cyberattack
|
washingtonpost.com /wp-dyn/content/article/2010/08/24/AR2010082406495.html
|
Now it is official: The most significant breach of U.S. military computers was caused by a flash drive inserted into a
|
U.S. military laptop on a post in the Middle East in 2008.
|
In an article to be published Wednesday discussing the Pentagon's cyberstrategy, Deputy Defense Secretary
|
William J. Lynn III says malicious code placed on the drive by a foreign intelligence agency uploaded itself onto a
|
network run by the U.S. military's Central Command.
|
"That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital
|
beachhead, from which data could be transferred to servers under foreign control," he says in the Foreign Affairs
|
article.
|
"It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans
|
into the hands of an unknown adversary."
|
Lynn's decision to declassify an incident that Defense officials had kept secret reflects the Pentagon's desire to raise
|
congressional and public concern over the threats facing U.S. computer systems, experts said.
|
Much of what Lynn writes in Foreign Affairs has been said before: that the Pentagon's 15,000 networks and 7 million
|
computing devices are being probed thousands of times daily; that cyberwar is asymmetric; and that traditional Cold
|
War deterrence models of assured retaliation do not apply to cyberspace, where it is difficult to identify the instigator
|
of an attack.
|
But he also presents new details about the Defense Department's cyberstrategy, including the development of ways
|
to find intruders inside the network. That is part of what is called "active defense."
|
He puts the Homeland Security Department on notice that although it has the "lead" in protecting the dot.gov and
|
dot.com domains, the Pentagon - which includes the ultra-secret National Security Agency - should support efforts to
|
protect critical industry networks.
|
Lynn's declassification of the 2008 incident has prompted concern among cyberexperts that he gave adversaries
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.