PENTAGON'S CYBERSECURITY STRATEGY
Table of contents
Share
QR
Metrics
PENTAGON'S CYBERSECURITY STRATEGY
Annotation
PII
S268667300000619-0-1
Publication type
Article
Status
Published
Edition
Pages
51-60
Abstract
The authors of this article analyze major trends in military aspects of ensuring cybersecurity in the United States. Among different problems that the new CYBERCOMMAND faces the most urgent are: development of long-term cybersecurity strategy, reform of the military information technology contract system, development of international legislation in the field of information security, etc.
Keywords
information technology, national security, Pentagon, cybercommand
Date of publication
01.01.2011
Number of purchasers
1
Views
785
Readers community rating
0.0 (0 votes)
Cite   Download pdf

References



Additional sources and materials

1. Glaz'ev Sergej. Mirovoj ehkonomicheskij krizis kak protsess dominiruyuschikh tekhnologicheskikh ukladov ((<http://www.glazev.ru/scienexpert/84/>).
2. Rogovskij E.A. Liderstvo SShA v global'nykh tekhnologiyakh i mezhdunarodnaya bezopasnost' // SShA ϖ Kanada. 2007. № 9. S. 53-70.
3. Gorman S., Cole A., Dreazen Y. Computer Spies Breach Fighter-Jet Project // Wall Street Journal. 21.04.2009 (http://online.wsj.com/article/SB124027491029837401.html#printMode).
4. Lynn William J. Defending a New Domain: The Pentagon's Cyberstartegy // Foreign Affairs. September/October 2010.
5. McConnell M. How to Win the Cyber-war We're Loosing // The Washington Post. 28.02.2010 (<http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/AR2010022502493_pf.html>).
6. Nakashima E. Pentagon's Cyber Command Seeks Authority to Expand Its Battlefield // Washington Post Saturday, November 6, 2010 http://www.washingtonpost.com/wp-dyn/content/article/2010/11/05/AR2010110507304_pf.html

Comments

No posts found

Write a review
Translate