Búsqueda

Anti-social networking : crowdsourcing and the cyber defence of national critical infrastructures

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20140019366</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20140530130410.0</controlfield>
    <controlfield tag="008">140527e20140303esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">875</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20140009442</subfield>
      <subfield code="a">Johnson, Chris W.</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Anti-social networking</subfield>
      <subfield code="b">: crowdsourcing and the cyber defence of national critical infrastructures</subfield>
      <subfield code="c">Chris W. Johnson</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">We identify four roles that social networking plays in the attribution problem¿, which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the dark side¿ of social networking.</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20100019818</subfield>
      <subfield code="t">Ergonomics : the international journal of research and practice in human factors and ergonomics</subfield>
      <subfield code="d">Oxon [United Kingdom] : Taylor & Francis, 2010-</subfield>
      <subfield code="x">0014-0139</subfield>
      <subfield code="g">03/03/2014 Volumen 57 Número 3 - marzo 2014 </subfield>
    </datafield>
    <datafield tag="856" ind1=" " ind2=" ">
      <subfield code="y">MÁS INFORMACIÓN</subfield>
      <subfield code="u">mailto:centrodocumentacion@fundacionmapfre.org?subject=Consulta%20de%20una%20publicaci%C3%B3n%20&body=Necesito%20m%C3%A1s%20informaci%C3%B3n%20sobre%20este%20documento%3A%20%0A%0A%5Banote%20aqu%C3%AD%20el%20titulo%20completo%20del%20documento%20del%20que%20desea%20informaci%C3%B3n%20y%20nos%20pondremos%20en%20contacto%20con%20usted%5D%20%0A%0AGracias%20%0A</subfield>
    </datafield>
  </record>
</collection>