Abstract :
The following topics are dealt with: Cyber security; military deployed networks; Cyber terrorism; information troops; Cyber red team; Cyber blueprint; cyberspace deterrence strategy; Botnet; organizational privacy and intrusion detection log sharing.
Keywords :
computer crime; computer network security; military communication; military computing; terrorism; Botnet; Cyber blueprint; Cyber red team; Cyber security; Cyber terrorism; cyberspace deterrence strategy; information troops; intrusion detection log sharing; military deployed networks; organizational privacy;
Conference_Titel :
Cyber Conflict (ICCC), 2011 3rd International Conference on
Conference_Location :
Tallinn
Print_ISBN :
978-1-61284-245-5