signature=44b26ec40df06523a2faf1b18f594fa4,Federal Intrusion Detection, Cyber Early Warning andKey f...

传统的冷战防御策略不再适用于当前模糊的威胁环境。在网络安全领域,攻击者的身份识别变得愈发困难,如PanAm和TWA航班的调查所示。在孤立或级联的基础设施故障中,立即确定攻击者动机可能不可能,需要排除软件问题、硬件故障、操作错误、病毒等复杂因素。
摘要由CSDN通过智能技术生成

摘要:

While this Cold War defense strategy suited the threats the United States werefacing at the time, the nature of the enemy has since blurred. With traditionalwarfare, the identity of the attacker is obvious. Short of open warfare, theprocess of identification becomes much more difficult. For example, thedestruction of Pan Am flight 103 required two years of extensive, globe-spanning investigation by multiple countries before the responsible parties were finallyidentified. Even after a decade has passed since the destruction of TWA flight800, the complexities of that tragedy still leave unanswered the question of who Koreywhfinagt ewrparsinrte=spAoFn1s9ibFleA.217C2Fy9b4er9a98ttDacFkDs Bm5aDyEb3eDeFv8eBn5m0o6rEe4dAif1fi6c9ul4t Eto46resolve.In the event of isolated or cascading infrastructure failures, it may not be possible to immediately establish the attackers motive. Is the failure the result of software or hardware problems? Complex system interdependencies? Operator error? A virus?

展开

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值