Búsqueda

Anti-social networking : crowdsourcing and the cyber defence of national critical infrastructures

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Anti-social networking</title>
<subTitle>: crowdsourcing and the cyber defence of national critical infrastructures</subTitle>
</titleInfo>
<name type="personal" usage="primary" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140009442">
<namePart>Johnson, Chris W.</namePart>
<nameIdentifier>MAPA20140009442</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<genre authority="marcgt">periodical</genre>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">esp</placeTerm>
</place>
<dateIssued encoding="marc">2014</dateIssued>
<issuance>serial</issuance>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
</physicalDescription>
<abstract displayLabel="Summary">We identify four roles that social networking plays in the attribution problem¿, which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the dark side¿ of social networking.</abstract>
<note type="statement of responsibility">Chris W. Johnson</note>
<classification authority="">875</classification>
<location>
<url displayLabel="MÁS INFORMACIÓN" usage="primary display">mailto:centrodocumentacion@fundacionmapfre.org?subject=Consulta%20de%20una%20publicaci%C3%B3n%20&body=Necesito%20m%C3%A1s%20informaci%C3%B3n%20sobre%20este%20documento%3A%20%0A%0A%5Banote%20aqu%C3%AD%20el%20titulo%20completo%20del%20documento%20del%20que%20desea%20informaci%C3%B3n%20y%20nos%20pondremos%20en%20contacto%20con%20usted%5D%20%0A%0AGracias%20%0A</url>
</location>
<relatedItem type="host">
<titleInfo>
<title>Ergonomics : the international journal of research and practice in human factors and ergonomics</title>
</titleInfo>
<originInfo>
<publisher>Oxon [United Kingdom] : Taylor & Francis, 2010-</publisher>
</originInfo>
<identifier type="issn">0014-0139</identifier>
<identifier type="local">MAP20100019818</identifier>
<part>
<text>03/03/2014 Volumen 57 Número 3 - marzo 2014 </text>
</part>
</relatedItem>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">140527</recordCreationDate>
<recordChangeDate encoding="iso8601">20140530130410.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20140019366</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>