메뉴 건너뛰기




Volumn 56, Issue 3, 2012, Pages 336-356

Pursuing Security in Cyberspace: Strategic and Organizational Challenges

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84862646119     PISSN: 00304387     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.orbis.2012.05.004     Document Type: Article
Times cited : (5)

References (68)
  • 1
    • 85028960825 scopus 로고    scopus 로고
    • Remarks by the President on Securing Our Nation's Critical Infrastructure
    • President Barack Obama, May 29, available at:
    • President Barack Obama, "Remarks by the President on Securing Our Nation's Critical Infrastructure," The White House Office of the Press Secretary, May 29, 2009, available at: http://www.whitehouse.gov/the-press-office/remarks-president-securing-our-nations-cyberinfrastructure.
    • (2009) The White House Office of the Press Secretary
  • 2
    • 85028992292 scopus 로고    scopus 로고
    • Keynote Address by Deputy Secretary of Defense Ashton Carter to the RSA Conference,
    • San Francisco, California, Feb. 28, available at:
    • Ashton B. Carter, "Keynote Address by Deputy Secretary of Defense Ashton Carter to the RSA Conference," San Francisco, California, Feb. 28, 2012, available at: http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1655.
    • (2012)
    • Carter, A.B.1
  • 3
    • 85028962286 scopus 로고    scopus 로고
    • Conference," San Francisco, California, Feb. 28, 2012, available at: 3 See Mitch Walfrop, "DARPA and the Internet Revolution," in DARPA, 50 Years of Bridging the Gap (Washington, D.C.: Defense Advanced Research Project Agency, Apr
    • Conference," San Francisco, California, Feb. 28, 2012, available at: http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1655. 3 See Mitch Walfrop, "DARPA and the Internet Revolution," in DARPA, 50 Years of Bridging the Gap (Washington, D.C.: Defense Advanced Research Project Agency, Apr. 2008), pp. 78-85.
    • (2008) , pp. 78-85
  • 4
    • 84893067830 scopus 로고    scopus 로고
    • Cyberspace: Definition and Implications
    • Dayton, Ohio, Apr. 8-9, (Reading: Academic Publishing Limited, 2010), 2, 3, accessed at:
    • Rain Ottis and Peeter Lorents, "Cyberspace: Definition and Implications, "in Proceedings of the 5th International Conference on Information Warfare and Security, Dayton, Ohio, Apr. 8-9, 2010 (Reading: Academic Publishing Limited, 2010), pp. 267-270, 2, 3, accessed at: http://www.ccdcoe.org/205.html.
    • (2010) Proceedings of the 5th International Conference on Information Warfare and Security , pp. 267-270
    • Ottis, R.1    Lorents, P.2
  • 5
    • 0742276097 scopus 로고    scopus 로고
    • Inside the Slammer Worm
    • No 4
    • David Moore, et al., "Inside the Slammer Worm," IEEE Security and rivacy, Vol 1, No 4 (2003), p.33.
    • (2003) IEEE Security and rivacy , vol.1 , pp. 33
    • Moore, D.1
  • 6
    • 84862679897 scopus 로고    scopus 로고
    • Statement of Commander, United States Cyber Command, before the House Committee on Armed Services
    • (Washington, DC: US Congress, Sept. 23
    • Keith B. Alexander, "Statement of Commander, United States Cyber Command, before the House Committee on Armed Services" (Washington, DC: US Congress, Sept. 23, 2010), p. 3.
    • (2010) , pp. 3
    • Alexander, K.B.1
  • 7
    • 84862695285 scopus 로고    scopus 로고
    • Security Summit 2010, Emerging Cyber Threats Report 2011 (Atlanta, GA: Georgia Tech Information Security Center, Oct. 7
    • Security Summit 2010, Emerging Cyber Threats Report 2011 (Atlanta, GA: Georgia Tech Information Security Center, Oct. 7, 2010), p. 6.
    • (2010) , pp. 6
  • 8
    • 84862695284 scopus 로고    scopus 로고
    • Cyber Power (Cambridge, MA: Belfer Center for Science and International Affairs, May
    • Joseph S. Nye, Jr. Cyber Power (Cambridge, MA: Belfer Center for Science and International Affairs, May 2010), p. 3.
    • (2010) , pp. 3
    • Nye Jr., J.S.1
  • 9
    • 85028998389 scopus 로고    scopus 로고
    • Statistics are drawn from the Miniwatts Marketing Group
    • available at
    • Statistics are drawn from the Miniwatts Marketing Group, available at: http://www.internetworldstats.com/.
  • 10
    • 85028980014 scopus 로고    scopus 로고
    • I am grateful to Dennis Bartko for this insight.
    • I am grateful to Dennis Bartko for this insight.
  • 11
    • 84862693983 scopus 로고    scopus 로고
    • Estimating Terrorism Risk (Santa Monica, CA: RAND
    • This formulation is adapted from that presented in Henry H. Willis, et al., Estimating Terrorism Risk (Santa Monica, CA: RAND, 2005), xvi.
    • (2005)
    • Willis, H.H.1
  • 12
    • 85028963249 scopus 로고    scopus 로고
    • United States Computer Emergency Readiness Team
    • available at:
    • United States Computer Emergency Readiness Team, "Cyber Threat Source Descriptions," available at: http://www.us-cert.gov/control_systems/csthreats.html.
    • Cyber Threat Source Descriptions
  • 13
    • 85028957550 scopus 로고    scopus 로고
    • Remarks on Cyber at the RSA Conference
    • San Francisco, California, Feb. 15, available at:
    • William J. Lynn, III, "Remarks on Cyber at the RSA Conference," San Francisco, California, Feb. 15, 2011, available at: http://www.defense.gov/Speeches/Speech.aspx?SpeechID=1535.
    • (2011)
    • Lynn III, W.J.1
  • 14
    • 84862693982 scopus 로고    scopus 로고
    • Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the House Permanent Select Committee on Intelligence (Washington, DC: Office of the Director of National Intelligence, Feb. 10
    • James R. Clapper, Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the House Permanent Select Committee on Intelligence (Washington, DC: Office of the Director of National Intelligence, Feb. 10, 2011), p. 28.
    • (2011) , pp. 28
    • Clapper, J.R.1
  • 15
    • 84862499008 scopus 로고    scopus 로고
    • Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence Washington
    • D.C.: Office of the Director of National Intelligence, Jan. 31
    • James R. Clapper, Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence Washington, D.C.: Office of the Director of National Intelligence, Jan. 31, 2012), p. 7.
    • (2012) , pp. 7
    • Clapper, J.R.1
  • 16
    • 84862659225 scopus 로고    scopus 로고
    • Security Summit 2010, Emerging Cyber Threats Report
    • Security Summit 2010, Emerging Cyber Threats Report 2011, p. 3.
    • (2011) , pp. 3
  • 17
    • 84862693985 scopus 로고    scopus 로고
    • "Symantec Internet Security Threat Report: Trends for 2009," Symantec, Apr.
    • "Symantec Internet Security Threat Report: Trends for 2009," Symantec, Apr. 2010.
    • (2010)
  • 18
    • 84862695290 scopus 로고    scopus 로고
    • Office of the National Counterintelligence Executive
    • (Washington, D.C.: Office of the National Counterintelligence Executive, Oct.
    • Office of the National Counterintelligence Executive, Foreign Spies Stealing U.S. Economic Secrets in Cyberspace (Washington, D.C.: Office of the National Counterintelligence Executive, Oct. 2011), p. i.
    • (2011) Foreign Spies Stealing U.S. Economic Secrets in Cyberspace
  • 19
    • 85028984572 scopus 로고    scopus 로고
    • Dmitri Alperovitch, "Revealed: Operation Shady Rat," McAfee White Paper
    • Dmitri Alperovitch, "Revealed: Operation Shady Rat," McAfee White Paper, 2011, p. 2.
    • (2011) , pp. 2
  • 20
    • 85028972775 scopus 로고    scopus 로고
    • Significant Cyber Incidents Since
    • available at
    • "Significant Cyber Incidents Since 2006," Center for Strategic and International Studies, available at: http://dev.csis.org/files/publication/101021_Significant%20Cyber%20Incidents%20Since%202006.pdf.
    • (2006) Center for Strategic and International Studies
  • 21
    • 85028953222 scopus 로고    scopus 로고
    • Vice Admiral (Retired) John Michael McConnell, "The Cyber War Threat has been Grossly Exaggerated," Intelligence2 Debates, June 8, available at:
    • Vice Admiral (Retired) John Michael McConnell, "The Cyber War Threat has been Grossly Exaggerated," Intelligence2 Debates, June 8, 2010, available at: http://intelligencesquaredus.org/wpcontent/uploads/Cyber-War-060810.pdf.
    • (2010)
  • 22
    • 85028984536 scopus 로고    scopus 로고
    • Stock Selloff May Have Been Triggered by a Trader Error
    • CNBC.com with Reuters, May 6, available at:
    • "Stock Selloff May Have Been Triggered by a Trader Error," CNBC.com with Reuters, May 6, 2010, available at: http://www.cnbc.com/id/36999483/Stock_Selloff_May_Have_Been_Triggered_by_a_Trader_Error.
    • (2010)
  • 23
    • 85028977846 scopus 로고    scopus 로고
    • 'Anonymous' Launches DDoS Attacks Against WikiLeaks Foes
    • PCMag.com, Dec. 8, available at:
    • Horn Leslie, "'Anonymous' Launches DDoS Attacks Against WikiLeaks Foes," PCMag.com, Dec. 8, 2010, available at: http://www.pcmag.com/article2/0,2817,2374023,00.asp.
    • (2010)
    • Leslie, H.1
  • 25
    • 85028959455 scopus 로고    scopus 로고
    • Cyber Command chief details threats to US
    • CNET News, Aug. 5, available at:
    • Lance Whitney, "Cyber Command chief details threats to US," CNET News, Aug. 5, 2010, available at: http://news.cnet.com/8301-13639_3-20012774-42.html.
    • (2010)
    • Whitney, L.1
  • 26
    • 84862693995 scopus 로고    scopus 로고
    • Security Summit 2010, Emerging Cyber Threats Report
    • Security Summit 2010, Emerging Cyber Threats Report 2011, p. 8.
    • (2011) , pp. 8
  • 27
    • 85028996854 scopus 로고    scopus 로고
    • Speech at the RSA Cyber Security Conference
    • San Francisco, CA, Mar. 1, available at:
    • Robert S. Mueller, III, "Speech at the RSA Cyber Security Conference," San Francisco, CA, Mar. 1, 2012, available at: http://www.fbi.gov/news/speeches/combating-threats-in-the-cyber-world-..3
    • (2012)
    • Mueller III, R.S.1
  • 28
    • 85028980548 scopus 로고    scopus 로고
    • The White House, Cyberspace Policy Review
    • The White House, Cyberspace Policy Review, p. 1.
  • 29
    • 84862695288 scopus 로고    scopus 로고
    • The White House, International Strategy for Cyberspace (Washington, D.C.: The White House, May
    • The White House, International Strategy for Cyberspace (Washington, D.C.: The White House, May 2011), p. 4
    • (2011) , pp. 4
  • 30
    • 85028998287 scopus 로고    scopus 로고
    • "Critical Infrastructure," Department of Homeland Security, accessed at:
    • "Critical Infrastructure," Department of Homeland Security, accessed at: http://www.dhs.gov/files/programs/gc_1189168948944.shtm.
  • 31
    • 84862695293 scopus 로고    scopus 로고
    • Department of Homeland Security, National Infrastructure Protection Plan (Washington, D.C.: Department of Homeland Security
    • Department of Homeland Security, National Infrastructure Protection Plan (Washington, D.C.: Department of Homeland Security, 2009), p. 12.
    • (2009) , pp. 12
  • 32
    • 84862693993 scopus 로고    scopus 로고
    • Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence (Washington, DC: Office of the Director of National Intelligence, Feb. 12
    • Dennis C. Blair, Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence (Washington, DC: Office of the Director of National Intelligence, Feb. 12, 2009), p. 38.
    • (2009) , pp. 38
    • Blair, D.C.1
  • 33
    • 84862695298 scopus 로고    scopus 로고
    • Security Summit 2010, Emerging Cyber Threats Report
    • Security Summit 2010, Emerging Cyber Threats Report 2011, p. 8
    • (2011) , pp. 8
  • 34
    • 85029009260 scopus 로고    scopus 로고
    • Cyber Threat to Critical Infrastructure 2010-2015: Increased Control System Exposure
    • Idaho National Laboratory, Sept. 24, available at:
    • Peter D. Gasper, "Cyber Threat to Critical Infrastructure 2010-2015: Increased Control System Exposure," Idaho National Laboratory, Sept. 24, 2008, available at: http://usacac.army.mil/cac2/cew/repository/presentations/15_Idaho_Natl_Lab_IACSCI_Threat_2010-2015.pdf.
    • (2008)
    • Gasper, P.D.1
  • 35
    • 77957021089 scopus 로고    scopus 로고
    • Cyber War: the Next Threat to National Security and What to Do About It
    • (New York: Ecco
    • Richard A. Clarke and Robert K. Knake, Cyber War: the Next Threat to National Security and What to Do About It (New York: Ecco, 2010), p. 169.
    • (2010) , pp. 169
    • Clarke, R.A.1    Knake, R.K.2
  • 36
    • 85028993635 scopus 로고    scopus 로고
    • First Annual Cost of Cyber Crime Study: Benchmark Study of US Companies
    • Ponemon Institute, July, available at:
    • First Annual Cost of Cyber Crime Study: Benchmark Study of US Companies, Ponemon Institute, July 2010, p. 1, available at: http://www.riskandinsurancechalkboard.com/uploads/file/Ponemon%20Study%281%29.pdf.
    • (2010) , pp. 1
  • 37
    • 85028993947 scopus 로고    scopus 로고
    • "Chronology of Data Breaches: Security Breaches 2005-Present, Privacy Rights Clearinghouse, available at:, as cited by David Z. Bodenheimer, Esq., "Statement Before the House Armed Services Committee's Subcommittee on Terrorism, Unconventional Threats and Capabilities Concerning Private Sector Perspectives on Department of Defense Information Technology and Cybersecurity Activities" (Washington, D.C.: U.S. Congress, Feb. 25
    • "Chronology of Data Breaches: Security Breaches 2005-Present, Privacy Rights Clearinghouse, available at: http://www.privacyrights.org/data-breach#CP, as cited by David Z. Bodenheimer, Esq., "Statement Before the House Armed Services Committee's Subcommittee on Terrorism, Unconventional Threats and Capabilities Concerning Private Sector Perspectives on Department of Defense Information Technology and Cybersecurity Activities" (Washington, D.C.: U.S. Congress, Feb. 25, 2010), p. 4.
    • (2010) , pp. 4
  • 38
    • 77958600609 scopus 로고    scopus 로고
    • Defending a New Domain: The Pentagon's Cyberstrategy
    • Foreign Affairs, Sept./Oct.
    • William F. Lynn III, "Defending a New Domain: The Pentagon's Cyberstrategy," Foreign Affairs, Sept./Oct. 2010, p. 98.
    • (2010) , pp. 98
    • Lynn III, W.F.1
  • 39
    • 84862652975 scopus 로고    scopus 로고
    • CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later (Washington, DC: Center for Strategic and International Studies, Jan.
    • CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later (Washington, DC: Center for Strategic and International Studies, Jan. 2011), p. 1.
    • (2011) , pp. 1
  • 41
    • 85029001152 scopus 로고    scopus 로고
    • CSIS Commission on Cybersecurity for the 44th Presidency
    • CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, p. 5
    • Cybersecurity Two Years Later , pp. 5
  • 42
    • 85028996172 scopus 로고    scopus 로고
    • CyberCom: U.S. Lacks Online Situational Awareness
    • DefenseNews.com, June 3, available at:
    • "CyberCom: U.S. Lacks Online Situational Awareness," DefenseNews.com, June 3, 2010, available at: http://www.defensenews.com/story.php?i=4655216.
    • (2010)
  • 43
    • 79956266592 scopus 로고    scopus 로고
    • Defending a New Domain
    • Lynn, "Defending a New Domain," p. 103.
    • Lynn1
  • 44
    • 79961092543 scopus 로고    scopus 로고
    • Privacy Impact Assessment for the Initiative Three Exercise
    • Department of Homeland Security, Mar. 18, available at
    • Mary Ellen Callahan, "Privacy Impact Assessment for the Initiative Three Exercise," Department of Homeland Security, Mar. 18, 2010, available at: http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_nppd_initiative3exercise.pdf.
    • (2010)
    • Callahan, M.E.1
  • 45
    • 79956266592 scopus 로고    scopus 로고
    • Defending a New Domain
    • Lynn, "Defending a New Domain," p. 103.
    • Lynn1
  • 46
    • 85028962577 scopus 로고    scopus 로고
    • General Keith Alexander, as cited in Whitney, "Cyber Command chief details threats to US"
    • General Keith Alexander, as cited in Whitney, "Cyber Command chief details threats to US"
  • 47
    • 70449553230 scopus 로고    scopus 로고
    • Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence
    • Blair, Annual Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence, 2009, p. 40.
    • (2009) , pp. 40
    • Blair1
  • 48
    • 79956266592 scopus 로고    scopus 로고
    • Defending a New Domain
    • Lynn, "Defending a New Domain," pp. 104-105.
    • Lynn1
  • 49
    • 84862693997 scopus 로고    scopus 로고
    • Executive Office of the President, Director of the Office of Management and the Budget, Memorandum for the Heads of Executive Departments and Agencies, "Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security (DHS)," July 6
    • Executive Office of the President, Director of the Office of Management and the Budget, Memorandum for the Heads of Executive Departments and Agencies, "Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security (DHS)," July 6, 2010.
    • (2010)
  • 50
    • 85028971238 scopus 로고    scopus 로고
    • CSIS Commission on Cybersecurity for the 44th Presidency
    • especially
    • CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, especially pp. 7-8.
    • Cybersecurity Two Years Later , pp. 7-8
  • 51
    • 84862654151 scopus 로고    scopus 로고
    • Multilateral Agreements to Constrain Cyberconflict
    • Arms Control Today, June, available at:
    • James Lewis, "Multilateral Agreements to Constrain Cyberconflict," Arms Control Today, June 2010, available at: http://www.armscontrol.org/act/2010_06/Lewis.
    • (2010)
    • Lewis, J.1
  • 52
    • 85028978920 scopus 로고    scopus 로고
    • The discussion in this paragraph has been informed by and greatly benefitted from Martin C. Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Project Air Force, 2009).
    • The discussion in this paragraph has been informed by and greatly benefitted from Martin C. Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Project Air Force, 2009).
  • 53
    • 85028996007 scopus 로고    scopus 로고
    • Statement of Commander, United States Cyber Command, before the House Committee on Armed Services
    • Alexander, "Statement of Commander, United States Cyber Command, before the House Committee on Armed Services," p. 5.
    • Alexander1
  • 54
    • 85029003678 scopus 로고    scopus 로고
    • CSIS Commission on Cybersecurity for the 44th Presidency
    • CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, p. 3.
    • Cybersecurity Two Years Later , pp. 3
  • 55
    • 0004266826 scopus 로고    scopus 로고
    • Bureaucracy: What Government Agencies Do and Why They Do It
    • (New York: Basic Books, Inc., 1989), especially chapter 10.
    • James Q. Wilson, Bureaucracy: What Government Agencies Do and Why They Do It (New York: Basic Books, Inc., 1989), especially chapter 10.
    • Wilson, J.Q.1
  • 56
    • 84862672866 scopus 로고    scopus 로고
    • Government Accountability Office, Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to be Consistently Addressed (Washington, DC: US Government Accountability Office, July
    • Government Accountability Office, Critical Infrastructure Protection: Key Private and Public Cyber Expectations Need to be Consistently Addressed (Washington, DC: US Government Accountability Office, July 2010).
    • (2010)
  • 57
    • 84859720480 scopus 로고    scopus 로고
    • Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense regarding Cybersecurity
    • Oct. 27, available at:
    • Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense regarding Cybersecurity, Oct. 27, 2010, available at: http://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf.
    • (2010)
  • 58
    • 85029010601 scopus 로고    scopus 로고
    • A Fleeting Idea: Department of Cyber
    • GovInfoSecurity.com, Feb. 16, 2011, available at:
    • Eric Chabrow, "A Fleeting Idea: Department of Cyber," GovInfoSecurity.com, Feb. 16, 2011, available at: http://www.bankinfosecurity.com/articles.php?art_id=3359.
    • Chabrow, E.1
  • 59
    • 85028963310 scopus 로고    scopus 로고
    • CSIS Commission on Cybersecurity for the 44th Presidency
    • CSIS Commission on Cybersecurity for the 44th Presidency, Securing Cyberspace for the 44th Presidency, p. 35.
    • Securing Cyberspace for the 44th Presidency , pp. 35
  • 60
    • 85028991735 scopus 로고    scopus 로고
    • Statement of Commander, United States Cyber Command, before the House Committee on Armed Services
    • Alexander, "Statement of Commander, United States Cyber Command, before the House Committee on Armed Services," pp. 5-6.
    • Alexander1
  • 61
    • 85028989102 scopus 로고    scopus 로고
    • Ibid.
    • Ibid., p. 1.
  • 62
    • 84893129967 scopus 로고    scopus 로고
    • What US Cyber Command Must Do
    • Joint Force Quarterly 59, no. 4
    • Wesley R. Andrues, "What US Cyber Command Must Do," Joint Force Quarterly 59, no. 4 (2010): pp. 116-117.
    • (2010) , pp. 116-117
    • Andrues, W.R.1
  • 63
    • 84862654153 scopus 로고    scopus 로고
    • General Accountability Office, Defense Department Cyber Efforts: DOD Faces Challenges in its Cyber Activities (Washington, DC: General Accountability Office, July
    • General Accountability Office, Defense Department Cyber Efforts: DOD Faces Challenges in its Cyber Activities (Washington, DC: General Accountability Office, July 2011).
    • (2011)
  • 64
    • 85028995278 scopus 로고    scopus 로고
    • Statement of Commander, United States Cyber Command, before the House Committee on Armed Services
    • Alexander, "Statement of Commander, United States Cyber Command, before the House Committee on Armed Services," p. 2.
    • Alexander1
  • 65
    • 0003460380 scopus 로고
    • The Masks of War: American Military Styles in Strategy and Analysis
    • Carl Builder, (Baltimore, MD: The Johns Hopkins University Press
    • Carl Builder, The Masks of War: American Military Styles in Strategy and Analysis (Baltimore, MD: The Johns Hopkins University Press, 1989).
    • (1989)
  • 66
    • 85028976829 scopus 로고    scopus 로고
    • Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations
    • Unconventional Threats and Capabilities, Sept. 23
    • "Operating in the Digital Domain: Organizing the Military Departments for Cyber Operations," Hearing of the House Armed Services Subcommittee on Terrorism, Unconventional Threats and Capabilities, Sept. 23, 2010.
    • (2010) Hearing of the House Armed Services Subcommittee on Terrorism
  • 67
    • 84862645189 scopus 로고    scopus 로고
    • cited in CSIS Commission on Cybersecurity for the 44th Presidency, A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters (Washington, DC: Center for Strategic & International Studies, July
    • James Gosler, cited in CSIS Commission on Cybersecurity for the 44th Presidency, A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters (Washington, DC: Center for Strategic & International Studies, July 2010), p. 1.
    • (2010) , pp. 1
    • Gosler, J.1
  • 68
    • 85028965792 scopus 로고    scopus 로고
    • CSIS Commission on Cybersecurity for the 44th Presidency
    • especially
    • CSIS Commission on Cybersecurity for the 44th Presidency, Cybersecurity Two Years Later, especially p. 2.\
    • Cybersecurity Two Years Later , pp. 2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.