메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-474

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation

Author keywords

[No Author keywords available]

Indexed keywords

CIRCUIT THEORY; COMPUTATION THEORY; FACSIMILE; NATIONAL SECURITY; OPEN SOURCE SOFTWARE; OPEN SYSTEMS; PUBLIC WORKS; SITE SELECTION; STUDENTS;

EID: 85017399708     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/0471789542     Document Type: Book
Times cited : (256)

References (245)
  • 1
    • 85017342093 scopus 로고    scopus 로고
    • Critical nodes will be synonymous with hubs, in this book
    • Critical nodes will be synonymous with hubs, in this book.
  • 2
    • 0003994024 scopus 로고    scopus 로고
    • Critical Foundations: Protecting America's Infrastructures
    • The Report of the President's Commission on Critical Infrastructure Protection, October
    • Critical Foundations: Protecting America's Infrastructures," The Report of the President's Commission on Critical Infrastructure Protection, October 1997.
    • (1997)
  • 3
    • 0003845128 scopus 로고    scopus 로고
    • Exploring Corporate Strategy: Text and Cases
    • Englewood Cliffs, NJ, Prentice-Hall
    • G. Johnson and K. Scholes, Exploring Corporate Strategy: Text and Cases. Englewood Cliffs, NJ:Prentice-Hall, 2001.
    • (2001)
    • Johnson, G.1    Scholes, K.2
  • 4
    • 85017401406 scopus 로고    scopus 로고
    • There is currently no definition of homeland defense. The proposed definition shows the Army's mission to protect our territory, population, and critical infrastructure by; deterring/defending against foreign and domestic threats, supporting civil authorities for crisis and consequence management, and helping to ensure the continuance [of] critical national assets
    • At the time of this writing, homeland defense was undergoing revision. In an Army document dated April, the term was described as follows
    • At the time of this writing, homeland defense was undergoing revision. In an Army document dated April 1999, the term was described as follows: "There is currently no definition of homeland defense. The proposed definition shows the Army's mission to protect our territory, population, and critical infrastructure by; deterring/defending against foreign and domestic threats, supporting civil authorities for crisis and consequence management, and helping to ensure the continuance [of] critical national assets."http://www.fas.org/spp/starwars/program/homeland/executive-overview.htm.
    • (1999)
  • 5
    • 85017402516 scopus 로고    scopus 로고
    • The enclosed disk includes several simulation programs that demonstrate the concepts described here
    • The enclosed disk includes several simulation programs that demonstrate the concepts described here.
  • 6
    • 85017396041 scopus 로고    scopus 로고
    • The Whitehouse: Homeland Security Presidential Directive/HSPD-7
    • December 17
    • The Whitehouse: Homeland Security Presidential Directive/HSPD-7, December 17, 2003.
    • (2003)
  • 7
    • 85017397055 scopus 로고    scopus 로고
    • The "most popular" or "busiest" Internet servers are easily found by a variety of methods, not the least of which are "crawlers" or "spiders"
    • software programs that travel through the Internet on their own and report back on what they find
    • The "most popular" or "busiest" Internet servers are easily found by a variety of methods, not the least of which are "crawlers" or "spiders"software programs that travel through the Internet on their own and report back on what they find.
  • 8
    • 85017332238 scopus 로고    scopus 로고
    • http://www.ncs.gov/about.html.
  • 9
    • 85017334197 scopus 로고    scopus 로고
    • http://www.archives.gov/federal_register/codification/executive_order/12148.html.
  • 10
    • 85017388336 scopus 로고    scopus 로고
    • http://www.religioustolerance.org/rajneesh.htm.
  • 11
    • 85017369367 scopus 로고    scopus 로고
    • The group settled on the 65,000 acre 'Big Muddy Ranch' near Antelope, Oregon, which his sannyasins had bought for six million dollars. The ranch was renamed Rajneeshpuram ("Essence of Rajneesh")
    • This 'small, desolate valley twelve miles from Antelope, Oregon was transformed into a thriving town of 3,000 residents, with a 4,500 foot paved airstrip, a 44 acre reservoir, an 88,000 square foot meeting hall '"
    • "The group settled on the 65,000 acre 'Big Muddy Ranch' near Antelope, Oregon, which his sannyasins had bought for six million dollars. The ranch was renamed Rajneeshpuram ("Essence of Rajneesh").This 'small, desolate valley twelve miles from Antelope, Oregon was transformed into a thriving town of 3,000 residents, with a 4,500 foot paved airstrip, a 44 acre reservoir, an 88,000 square foot meeting hall '" http://www.clui.org/clui_4_1/lotl/lotlv10/rajneesh.html.
  • 12
    • 85017331663 scopus 로고    scopus 로고
    • http://home.att.net/meditation/bioterrorist.html.
  • 13
    • 85017403777 scopus 로고    scopus 로고
    • http://www.fas.org/irp/offdocs/pdd39.htm.
  • 14
    • 0003994024 scopus 로고    scopus 로고
    • Critical Foundations: Protecting America's Infrastructures
    • The Report of the President's Commission on Critical Infrastructure Protection, October
    • "Critical Foundations: Protecting America's Infrastructures," The Report of the President's Commission on Critical Infrastructure Protection, October 1997.
    • (1997)
  • 15
    • 85017375855 scopus 로고    scopus 로고
    • http://www.fas.org/irp/offdocs/eo13010.htm.
  • 16
    • 85017352924 scopus 로고    scopus 로고
    • http://www.fas.org/irp/offdocs/pdd/pdd-63.htm.
  • 17
    • 85017392116 scopus 로고    scopus 로고
    • http://www.archives.gov/federal_register/executive_orders/1999.html#13130.
  • 18
    • 0141915841 scopus 로고    scopus 로고
    • The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
    • February, Department of Homeland Security
    • The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, February 2003, Department of Homeland Security. http://www.whitehouse.gov/pcipb/physical.html.
    • (2003)
  • 19
    • 85017380381 scopus 로고    scopus 로고
    • The Whitehouse, "Homeland Security Presidential Directive/Hspd-7,"
    • December 17
    • The Whitehouse, "Homeland Security Presidential Directive/Hspd-7," December 17, 2003.
    • (2003)
  • 20
    • 85017380381 scopus 로고    scopus 로고
    • The Whitehouse, "Homeland Security Presidential Directive/Hspd-7,"
    • December 17
    • The Whitehouse, "Homeland Security Presidential Directive/Hspd-7," December 17, 2003
    • (2003)
  • 21
    • 85017380381 scopus 로고    scopus 로고
    • The Whitehouse, "Homeland Security Presidential Directive/Hspd-7,"
    • December 17
    • The Whitehouse, "Homeland Security Presidential Directive/Hspd-7," December 17, 2003
    • (2003)
  • 22
    • 85017379234 scopus 로고    scopus 로고
    • San Lewis Rey is a virtual city in cyber-space where all bad things happen
    • It is a pedagogical device for exercising the reader's ability to apply what he or she has learned from the text
    • San Lewis Rey is a virtual city in cyber-space where all bad things happen. It is a pedagogical device for exercising the reader's ability to apply what he or she has learned from the text.
  • 23
    • 0141915841 scopus 로고    scopus 로고
    • The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
    • Feb
    • The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, Feb. 2003,p. 9.
    • (2003) , pp. 9
  • 24
    • 85017339192 scopus 로고    scopus 로고
    • http://www.archives.gov/federal_register/codification/executive_order/12656.html.
  • 25
    • 0009032943 scopus 로고
    • Disaster Assistance: Federal, State, and Local Responses to Natural Disasters Need Improvement
    • T-RCED-91-57, May 15
    • http://www.gao.gov Disaster Assistance: Federal, State, and Local Responses to Natural Disasters Need Improvement, T-RCED-91-57, May 15, 1991.
    • (1991)
  • 26
    • 85017399550 scopus 로고    scopus 로고
    • http://www.fas.org/irp/offdocs/pdd39.htm.
  • 27
    • 0347924440 scopus 로고    scopus 로고
    • Problems of Preparedness
    • Paper 2000-28, Belfer Center, Harvard University,December
    • Richard A. Falkenrath "Problems of Preparedness" Paper 2000-28, Belfer Center, Harvard University,December 2000.
    • (2000)
    • Falkenrath, R.A.1
  • 28
    • 85017332809 scopus 로고    scopus 로고
    • Leadership, Hyperion Books, New York
    • R. W. Giuliani, Leadership, Hyperion Books, New York, 2002, pp. 14-15.
    • (2002) , pp. 14-15
    • Giuliani, R.W.1
  • 29
    • 84883916747 scopus 로고    scopus 로고
    • The Internet Under Crisis Conditions
    • Learning from September 11, National Research Council,National Academies Press, Washington, D.C.
    • The Internet Under Crisis Conditions: Learning from September 11, National Research Council,National Academies Press, Washington, D.C., 2001, p. 1.
    • (2001) , pp. 1
  • 30
    • 84883916747 scopus 로고    scopus 로고
    • The Internet Under Crisis Conditions
    • Learning from September 11, National Research Council,National Academies Press, Washington, D.C.
    • The Internet Under Crisis Conditions: Learning from September 11, National Research Council,National Academies Press, Washington, D.C., 2001, p. 8; p. 25.
    • (2001)
  • 31
    • 85017401900 scopus 로고    scopus 로고
    • One can argue that the only reliable methodology is foolproof intelligence, which is an oxymoron
    • One can argue that the only reliable methodology is foolproof intelligence, which is an oxymoron.
  • 32
    • 0012355752 scopus 로고    scopus 로고
    • Topics in Operations Research: Predicting Combat Effects
    • Military Applications Society, INFORMS
    • D.S. Hartley, "Topics in Operations Research: Predicting Combat Effects," Military Applications Society, INFORMS, informs@informs.org, 2001.
    • (2001)
    • Hartley, D.S.1
  • 33
    • 0141915841 scopus 로고    scopus 로고
    • National Strategy for the Physical Protection of Critical Infrastructures and Key Assets
    • February
    • National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, February 2003.
    • (2003)
  • 34
    • 85017387423 scopus 로고    scopus 로고
    • html#Critical Infrastructure Information Sharing and Analysis Centers
    • http://www.ciao.gov/related/index.html#Critical Infrastructure Information Sharing and Analysis Centers.
  • 35
    • 85017385501 scopus 로고    scopus 로고
    • http://thomas.loc.gov/cgi-bin/bdquery/z?d107:H.R.5005
  • 36
    • 85017351308 scopus 로고    scopus 로고
    • http://thomas.loc.gov/cgi-bin/bdquery/z?d107:H.R.5005
  • 37
    • 85017379080 scopus 로고    scopus 로고
    • Linked: How Everything Is Connected To Everything Else and What It Means for Business, Science, and Everyday Life, PLUME Cambridge Center, Cambridge, MA, 02142
    • A.-L. Barabasi, Linked: How Everything Is Connected To Everything Else and What It Means for Business, Science, and Everyday Life, PLUME Cambridge Center, Cambridge, MA, 02142, 2003.
    • (2003)
    • Barabasi, A.-L.1
  • 38
    • 85017354944 scopus 로고
    • Turtles, Termites, and Traffic Jams: Explorations in Massively Parallel Microworlds. MIT Press, Cambridge, MA
    • M. Resnick, Turtles, Termites, and Traffic Jams: Explorations in Massively Parallel Microworlds. MIT Press, Cambridge, MA, 1994.
    • (1994)
    • Resnick, M.1
  • 39
    • 85017356072 scopus 로고    scopus 로고
    • Termite is available from the website or the disk accompanying this book
    • Termite is available from the website or the disk accompanying this book.
  • 40
    • 85017407263 scopus 로고    scopus 로고
    • The Second Law of Thermodynamics says entropy always increases whenever a physical process takes place. Hence, order tends to disorder-not the opposite
    • The Second Law of Thermodynamics says entropy always increases whenever a physical process takes place. Hence, order tends to disorder-not the opposite.
  • 41
    • 85017398999 scopus 로고    scopus 로고
    • The term "scale free"
    • does not refer to the size nor the breadth of the network. Instead, scale-free networks obey a power law that has no variance, and the links are distributed according to a probability density function that is proportional to (1/k)p, where p is typically between 2 and 3
    • The term "scale free" does not refer to the size nor the breadth of the network. Instead, scale-free networks obey a power law that has no variance, and the links are distributed according to a probability density function that is proportional to (1/k)p, where p is typically between 2 and 3.
  • 42
    • 85017392864 scopus 로고    scopus 로고
    • Barabasi and others define a scale-free network as one with a power law p between 2 and 3. However, for our purposes, any value of p greater than 1.0 will do
    • Barabasi and others define a scale-free network as one with a power law p between 2 and 3. However, for our purposes, any value of p greater than 1.0 will do.
  • 43
    • 85017375278 scopus 로고    scopus 로고
    • PowerGraph.class and PowerGraph.html can be found on the disk and the website under
    • PowerGraph.class and PowerGraph.html can be found on the disk and the website under Scale-Free Demo.
    • Scale-Free Demo
  • 44
    • 85017343758 scopus 로고    scopus 로고
    • The Poisson distribution is a discrete probability distribution for X, where X takes on the values X 1/4 0,1,2,3,Its shape is determined by one parameter l, which is the expected value of X. If the average number of random occurrences per interval 1/4 l, the probability P of X occurrences in the interval is P(X) 1/4 el[lX/X!]
    • The Poisson distribution is a discrete probability distribution for X, where X takes on the values X 1/4 0,1,2,3,Its shape is determined by one parameter l, which is the expected value of X. If the average number of random occurrences per interval 1/4 l, the probability P of X occurrences in the interval is P(X) 1/4 el[lX/X!].
  • 45
    • 85017398087 scopus 로고    scopus 로고
    • Metcalf's Law states that the value of a network increases proportional to the square of the number of users
    • Metcalf's Law states that the value of a network increases proportional to the square of the number of users.
  • 46
    • 85017385758 scopus 로고    scopus 로고
    • The Road Atlas Deluxe
    • Only one and two digit interstate routes were counted-three-digit routes are beltway or spur roads in the system
    • The Road Atlas Deluxe, RAND McNally: United States, Canada, and Mexico, 2003. Only one and two digit interstate routes were counted-three-digit routes are beltway or spur roads in the system.
    • (2003) RAND McNally: United States, Canada, and Mexico
  • 47
    • 0033196289 scopus 로고    scopus 로고
    • Networks, Dynamics, and the Small-World Phenomenon
    • Sept
    • D.Watts, "Networks, Dynamics, and the Small-World Phenomenon," American Journal of Sociology,vol. 105, no. 2, pp. 493-527, Sept. 1999.
    • (1999) American Journal of Sociology , vol.105 , Issue.2 , pp. 493-527
    • Watts, D.1
  • 49
    • 41349118476 scopus 로고    scopus 로고
    • Halting viruses in scale-free networks
    • May
    • Z. Dezso and A.-L. Barabasi, "Halting viruses in scale-free networks," Physical Review E, vol. 65,p. 055103-(R), May 2002.
    • (2002) Physical Review E , vol.65 , pp. 055103
    • Dezso, Z.1    Barabasi, A.-L.2
  • 50
    • 85017331261 scopus 로고    scopus 로고
    • CascadeNet.jar and CascadeNet.html can be found on the website or accompanying disk
    • CascadeNet.jar and CascadeNet.html can be found on the website or accompanying disk.
  • 51
    • 85017402176 scopus 로고    scopus 로고
    • http://www.paretolaw.co.uk/principle.html
  • 52
    • 85017378147 scopus 로고    scopus 로고
    • San Lewis Rey is a virtual city in cyber-space where all bad things happen
    • San Lewis Rey is a virtual city in cyber-space where all bad things happen.
  • 53
    • 85017359040 scopus 로고    scopus 로고
    • a.k.a RGB.html",4>RGB.html, is available on the website or the accompanying disk
    • Program TreeLink, a.k.a RGB.html",4>RGB.html, is available on the website or the accompanying disk
    • Program TreeLink
  • 54
    • 85017351492 scopus 로고    scopus 로고
    • Boolean variables A and B can take on only one of two values: true or false
    • Named after, Ireland
    • Named after George Boole, 1815-1864, Ireland. Boolean variables A and B can take on only one of two values: true or false.
    • Boole, G.1
  • 55
    • 85017399827 scopus 로고    scopus 로고
    • partial truth
    • that is, a number between zero (FALSE) and 1.0 (TRUE),which measures the level of certainty that an event will occur. A probability of 50% means we are equally uncertain as to whether an event will occur. A probability of 25% means we are relatively sure that an event will not occur
    • We interpret probability as a "partial truth," that is, a number between zero (FALSE) and 1.0 (TRUE),which measures the level of certainty that an event will occur. A probability of 50% means we are equally uncertain as to whether an event will occur. A probability of 25% means we are relatively sure that an event will not occur.
    • We interpret probability as a
  • 56
    • 85017357933 scopus 로고    scopus 로고
    • OK, so it is not so amusing when your bank account is overdrawn, but this real-world example serves to illustrate subtleties in even simple systems
    • OK, so it is not so amusing when your bank account is overdrawn, but this real-world example serves to illustrate subtleties in even simple systems.
  • 57
    • 85017384280 scopus 로고    scopus 로고
    • It is not necessary to perform manual calculations as done here. Program FTplus.html (FT.jar) computes event tree events automatically
    • It is not necessary to perform manual calculations as done here. Program FTplus.html (FT.jar) computes event tree events automatically.
  • 58
    • 85017376267 scopus 로고    scopus 로고
    • A truth table could be used instead. An event tree was chosen because it is visual-the reader can see all possible events produced by assuming each fault is alternately true and then false
    • A truth table could be used instead. An event tree was chosen because it is visual-the reader can see all possible events produced by assuming each fault is alternately true and then false.
  • 59
    • 85017369253 scopus 로고    scopus 로고
    • A combination event is an event made up of a single, double, or triple event all at the same time
    • A combination event is an event made up of a single, double, or triple event all at the same time.
  • 60
    • 85017382848 scopus 로고    scopus 로고
    • Perhaps now the reader realizes that a combination event is simply a single, double, triple, and so on combination of one, two, three, and so on threats
    • Perhaps now the reader realizes that a combination event is simply a single, double, triple, and so on combination of one, two, three, and so on threats.
  • 61
    • 85017381063 scopus 로고    scopus 로고
    • An OR-tree is a tree with one OR gate connecting k threats to the root of the fault tree
    • An OR-tree is a tree with one OR gate connecting k threats to the root of the fault tree.
  • 62
    • 85017350838 scopus 로고    scopus 로고
    • An AND-tree is a tree with one AND gate connecting k threats to the root of the fault tree
    • An AND-tree is a tree with one AND gate connecting k threats to the root of the fault tree.
  • 63
    • 85017406979 scopus 로고    scopus 로고
    • Program, a.k.a FT.jar, described in Chapter 6, does much of the arithmetic needed to handle fault and event trees, which makes it possible to analyze fault/event trees containing thousands of events
    • Program FTplus.html, a.k.a FT.jar, described in Chapter 6, does much of the arithmetic needed to handle fault and event trees, which makes it possible to analyze fault/event trees containing thousands of events.
  • 64
    • 85017345307 scopus 로고    scopus 로고
    • Leonhard Euler and the Koenigsberg Bridges
    • Scientific American, July1953
    • Sisma, Pavel, "Leonhard Euler and the Koenigsberg Bridges," Scientific American, pp. 66-70, July1953. http://mathforum.org/epigone/math-history-list/skodwendjerm
    • Sisma, P.1
  • 65
    • 85017381792 scopus 로고    scopus 로고
    • We will come back to this later: Isolated nodes and nodes of degree one are shown to have little impact on the resulting investment strategy
    • We will come back to this later: Isolated nodes and nodes of degree one are shown to have little impact on the resulting investment strategy.
  • 66
    • 85017388918 scopus 로고    scopus 로고
    • These definitions will change for fault trees, because of AND/OR logic in the fault tree model
    • These definitions will change for fault trees, because of AND/OR logic in the fault tree model.
  • 67
    • 85017335794 scopus 로고    scopus 로고
    • In the case of a node with degree of one (a terminal node, for example), the amount of damage caused by its removal is less than the removal of its link, so the single-degreed node will lose points to its link
    • In the case of a node with degree of one (a terminal node, for example), the amount of damage caused by its removal is less than the removal of its link, so the single-degreed node will lose points to its link.
  • 68
    • 85017345437 scopus 로고    scopus 로고
    • Network Analysis also performs flow analysis, but this topic will not be covered here. See the Network Analysis User Guide for descriptions of other Network Analysis features
    • Network Analysis also performs flow analysis, but this topic will not be covered here. See the Network Analysis User Guide for descriptions of other Network Analysis features.
  • 69
    • 85017377874 scopus 로고    scopus 로고
    • NA.jar is the desktop version, the Web version. NA.jar can save and open local disk files, but, cannot
    • NA.jar is the desktop version, NetworkAnalysis.html the Web version. NA.jar can save and open local disk files, but NetworkAnalysis.html cannot.
  • 70
    • 85017339217 scopus 로고    scopus 로고
    • The users manual for NetworkAnalysis has many more details than provided here
    • The users manual for NetworkAnalysis has many more details than provided here.
  • 71
    • 85017388107 scopus 로고    scopus 로고
    • These examples can be found in the NetworkAnalysis software provided along with this book
    • These examples can be found in the NetworkAnalysis software provided along with this book.
  • 72
    • 85017349330 scopus 로고    scopus 로고
    • WASA is an example in the FTplus examples menu
    • WASA is an example in the FTplus examples menu.
  • 73
    • 85017380641 scopus 로고    scopus 로고
    • Small-world networks will contain critical clusters-neighborhoods of nodes that are critical
    • Small-world networks will contain critical clusters-neighborhoods of nodes that are critical.
  • 74
    • 85017332701 scopus 로고    scopus 로고
    • This simplification is an approximation of reality, because we know it is more costly to eliminate the last 1% of vulnerability than the first 1%
    • This simplification is an approximation of reality, because we know it is more costly to eliminate the last 1% of vulnerability than the first 1%.
  • 75
    • 85017342554 scopus 로고    scopus 로고
    • As mentioned, this may not be a valid assumption, but it is a simplification
    • As mentioned, this may not be a valid assumption, but it is a simplification.
  • 76
    • 85017391518 scopus 로고    scopus 로고
    • The program, incorporates the optimal risk reduction technique described here
    • The program FTplus incorporates the optimal risk reduction technique described here.
    • FTplus
  • 77
    • 85017333920 scopus 로고    scopus 로고
    • Emergence is a random process, so the answer may vary from application to application. In this case,the author obtained an allocation of $1, $49, $2, and $48
    • Emergence is a random process, so the answer may vary from application to application. In this case,the author obtained an allocation of $1, $49, $2, and $48.
  • 78
    • 85017338863 scopus 로고    scopus 로고
    • Of course we could also solve this problem using emergence, but whenever possible it is desirable to obtain a closed-form solution. Computers are fast and cheap, but humans are still more clever
    • Of course we could also solve this problem using emergence, but whenever possible it is desirable to obtain a closed-form solution. Computers are fast and cheap, but humans are still more clever.
  • 79
    • 85017370776 scopus 로고    scopus 로고
    • FTplus-also known as FT.jar-runs on the Web as FTplus and on the desktop as FT.jar
    • FTplus-also known as FT.jar-runs on the Web as FTplus and on the desktop as FT.jar.
  • 80
    • 85017375162 scopus 로고    scopus 로고
    • Details of how to use FTplus and FT.jar are provided in the operations manual
    • Details of how to use FTplus and FT.jar are provided in the operations manual.
  • 81
    • 85017394601 scopus 로고    scopus 로고
    • CARVER and Port Security Risk Assessment Tool (PSRAT)
    • two examples that use some kind of ranking to determine which vulnerability or risk is greatest
    • CARVER and Port Security Risk Assessment Tool (PSRAT) two examples that use some kind of ranking to determine which vulnerability or risk is greatest.
  • 82
    • 85017381563 scopus 로고    scopus 로고
    • Sharp corners
    • a result of functions with p1(12 p2)(12p3) terms, which when minimized tends to drive p1 to zero and p2, p3 to one. This causes the volume defined by p1(1 2p2)(12p3) to have "many zeros"-all indistinguishable from one another
    • "Sharp corners" a result of functions with p1(12 p2)(12p3) terms, which when minimized tends to drive p1 to zero and p2, p3 to one. This causes the volume defined by p1(1 2p2)(12p3) to have "many zeros"-all indistinguishable from one another.
  • 83
    • 0003409648 scopus 로고    scopus 로고
    • 25 Years of the Safe Drinking Water Act: History and Trends
    • EPA 816-R-99-007, December
    • "25 Years of the Safe Drinking Water Act: History and Trends," EPA 816-R-99-007, December 1999, http://www.epa.gov/safewater/consumer/trendrpt.pdf
    • (1999)
  • 84
    • 0003446974 scopus 로고    scopus 로고
    • Understanding the Safe Drinking Water Act
    • December, EPA 810-F-99-008. The EPA's Office of Ground Water and Drinking Water, website
    • Understanding the Safe Drinking Water Act, December 1999, EPA 810-F-99-008. The EPA's Office of Ground Water and Drinking Water, website: http://www.epa.gov/safewater/
    • (1999)
  • 85
    • 85017343036 scopus 로고    scopus 로고
    • http://www.fda.gov/oc/bioterrorism/PL107-188.html#title4
  • 86
    • 85017400716 scopus 로고
    • I Street, NW, Suite 500, 20006
    • http://www.WaterISAC.org, 1620 I Street, NW, Suite 500, Washington, D.C. 20006.
    • (1620)
    • Washington, D.C.1
  • 87
    • 85017400323 scopus 로고
    • The October 17, Loma Prieta Earthquake
    • The October 17, 1989 Loma Prieta Earthquake, http://www.sfmuseum.net/alm/quakes3.html#1989
    • (1989)
  • 88
    • 85017386684 scopus 로고
    • Memorandum to Tom Elzey, PUC General Manager from Art Jensen, Acting General Manager, November 21, Museum of the City of San Francisco
    • Memorandum to Tom Elzey, PUC General Manager from Art Jensen, Acting General Manager, November 21, 1989. Museum of the City of San Francisco.
    • (1989)
  • 89
    • 85017389220 scopus 로고    scopus 로고
    • http://Sfwater.org
  • 90
    • 85017358002 scopus 로고    scopus 로고
    • Another network could be constructed that models the interdependencies of water, power, and agriculture,but we resist the temptation here
    • Another network could be constructed that models the interdependencies of water, power, and agriculture,but we resist the temptation here.
  • 91
    • 84887311810 scopus 로고    scopus 로고
    • Hetch Hetchy Water and the Bay Area Economy
    • Bay Area Economic Forum, October
    • "Hetch Hetchy Water and the Bay Area Economy," Bay Area Economic Forum, October 2002, http://www.bayeconfor.org/baefinfrastruct.htm
    • (2002)
  • 92
    • 85017394860 scopus 로고    scopus 로고
    • Strictly speaking, the exponent should lie between 2 and 3, but we do not need to be mathematically rigorous. Our purpose is to identify the most connected nodes
    • Strictly speaking, the exponent should lie between 2 and 3, but we do not need to be mathematically rigorous. Our purpose is to identify the most connected nodes.
  • 93
    • 84887311810 scopus 로고    scopus 로고
    • Hetch Hetchy Water and the Bay Area Economy
    • Bay Area Economic Forum, October
    • "Hetch Hetchy Water and the Bay Area Economy," Bay Area Economic Forum, October 2002, http://www.bayeconfor.org/baefinfrastruct.htm
    • (2002)
  • 94
    • 85017391980 scopus 로고
    • Cryptosporidium: A Drinking Water Supply Problem
    • Water Resources Research Institute of the University of North Carolina. Special Report No. 12, November
    • Robert E. Holman, "Cryptosporidium: A Drinking Water Supply Problem," Water Resources Research Institute of the University of North Carolina. Special Report No. 12, November 1993.
    • (1993)
    • Holman, R.E.1
  • 95
    • 0038699574 scopus 로고    scopus 로고
    • Cost of Illness in the 1993 Waterborne Cryptosporidium Outbreak, Milwaukee, Wisconsin
    • April
    • Phaedra S. Corso, Michael H. Kramer, Kathleen A. Blair, David G. Addiss, Jeffrey P. Davis, and Anne C. Haddix, "Cost of Illness in the 1993 Waterborne Cryptosporidium Outbreak, Milwaukee, Wisconsin,"Emerging Infectious Diseases, vol. 9, no. 4, April 2003.
    • (2003) Emerging Infectious Diseases , vol.9 , Issue.4
    • Corso, P.S.1    Kramer, M.H.2    Blair, K.A.3    Addiss, D.G.4    Davis, J.P.5    Haddix, A.C.6
  • 96
    • 85017357270 scopus 로고    scopus 로고
    • is available on the disk accompanying this book and on the course website
    • Program FTplus, a.k.a. FT.jar, is available on the disk accompanying this book and on the course website.
    • Program FTplus, a.k.a. FT.jar
  • 97
    • 0011015077 scopus 로고    scopus 로고
    • Inviting Disaster: Lessons From the Edge of Technology
    • HarperBusiness, 2001
    • J. R. Chiles, "Inviting Disaster: Lessons From the Edge of Technology," HarperBusiness, 2001, 2002.http://www.invitingdisaster.com
    • (2002)
    • Chiles, J.R.1
  • 98
    • 85017339744 scopus 로고    scopus 로고
    • http://www.sss-mag.com/glossary/page4.html
  • 99
    • 85017394237 scopus 로고    scopus 로고
    • Personal communication with Joe Weiss, April
    • Personal communication with Joe Weiss, April 2005.
    • (2005)
  • 100
    • 85017380487 scopus 로고    scopus 로고
    • http://niap.nist.gov/
  • 101
    • 85017371008 scopus 로고    scopus 로고
    • http://www.it-isac.org/
  • 102
    • 85017360495 scopus 로고    scopus 로고
    • ARC Advisory Group, http://www.ARCweb.com
  • 103
    • 85017401311 scopus 로고    scopus 로고
    • Newton-Evans Research, Baltimore, MD
    • Newton-Evans Research, Baltimore, MD, http://www.newton-evans.com
  • 104
    • 85017352821 scopus 로고    scopus 로고
    • Only the apportioned risk reduction strategy is reported here. The others are left as an exercise for the reader
    • Only the apportioned risk reduction strategy is reported here. The others are left as an exercise for the reader.
  • 105
    • 85017401869 scopus 로고    scopus 로고
    • A firewall is a computer that filters or blocks input and output data ports, thus restricting user access to a network or subnetwork
    • A firewall is a computer that filters or blocks input and output data ports, thus restricting user access to a network or subnetwork.
  • 106
    • 85017398325 scopus 로고    scopus 로고
    • In general we do not know the extent of damage that might be inflicted by a successful cyber-attack on some SCADA system
    • In general we do not know the extent of damage that might be inflicted by a successful cyber-attack on some SCADA system.
  • 107
    • 85017389810 scopus 로고    scopus 로고
    • Personal communication with Joe Weiss, April
    • Personal communication with Joe Weiss, April 2005.
    • (2005)
  • 108
    • 85017391247 scopus 로고    scopus 로고
    • 1/4 0&p 1/4 3629
    • http://www.utc.org/?v2_group 1/4 0&p 1/4 3629.
  • 109
    • 85017405368 scopus 로고    scopus 로고
    • http://www.neuronet.pitt.edu/bogdan/tesla/bio.htm
  • 110
    • 85017395428 scopus 로고    scopus 로고
    • http://www.ferc.gov/
  • 111
    • 0000561160 scopus 로고    scopus 로고
    • Reengineering the Electric Grid
    • May-June
    • T. Overbye, "Reengineering the Electric Grid," American Scientist, 88, 3, p. 220, May-June 2000.
    • (2000) American Scientist , vol.88 , Issue.3 , pp. 220
    • Overbye, T.1
  • 112
    • 0038852461 scopus 로고
    • Two Lectures on the Checks to Population, Oxford Univ. Press, Oxford, England, 1833,reprinted (in part) in Population, Evolution, and Birth Control, G. Hardin, Ed., Freeman, San Francisco
    • W. F. Lloyd, Two Lectures on the Checks to Population, Oxford Univ. Press, Oxford, England, 1833,reprinted (in part) in Population, Evolution, and Birth Control, G. Hardin, Ed., Freeman, San Francisco,1964, p. 37.
    • (1964) , pp. 37
    • Lloyd, W.F.1
  • 113
    • 0014413249 scopus 로고
    • The Tragedy of the Commons
    • SCIENCE, December
    • G. Hardin, "The Tragedy of the Commons," SCIENCE, Vol. 162, 13, December 1968, http://www.sciencemag.org
    • (1968) , vol.162 , Issue.13
    • Hardin, G.1
  • 114
    • 3042585477 scopus 로고    scopus 로고
    • Interim Report: Causes of the August 14th Blackout in the United States and Canada
    • U.S.-Canada Power System Outage Task Force, November
    • U.S.-Canada Power System Outage Task Force, "Interim Report: Causes of the August 14th Blackout in the United States and Canada," November 2003.
    • (2003)
  • 115
    • 85017360176 scopus 로고    scopus 로고
    • http://www.esisac.com
  • 116
    • 85017402094 scopus 로고    scopus 로고
    • To see an animation of real-time flow of electricity in the Eastern Power Grid, visit
    • To see an animation of real-time flow of electricity in the Eastern Power Grid, visit http://powerworld.com/Java/Eastern
  • 117
    • 85017407099 scopus 로고    scopus 로고
    • Not always: It depends on the number and connectivity of the transmission links!
    • Not always: It depends on the number and connectivity of the transmission links!
  • 118
    • 85017339467 scopus 로고    scopus 로고
    • Sometimes SCALE-ON must take from one generator to give to another, which may not be possible when MAX-ON is set
    • Sometimes SCALE-ON must take from one generator to give to another, which may not be possible when MAX-ON is set.
  • 119
    • 0035826155 scopus 로고    scopus 로고
    • Exploring Complex Networks
    • NATURE, March
    • S.H. Strogatz, "Exploring Complex Networks," NATURE, vol. 410, March 2001, http://www.nature.com
    • (2001) , vol.410
    • Strogatz, S.H.1
  • 120
    • 85017369695 scopus 로고    scopus 로고
    • Chapter 6 defines availability as (1 2p), where p is the fault probability associated with a vulnerability
    • Chapter 6 defines availability as (1 2p), where p is the fault probability associated with a vulnerability.
  • 121
    • 85017379481 scopus 로고    scopus 로고
    • The program RNet is available from the disk or the website
    • The program RNet is available from the disk or the website.
  • 122
    • 4444365340 scopus 로고    scopus 로고
    • Linked: How Everything Is Connected To Everything Else and What It Means for Business, Science, and Everyday Life
    • PLUME
    • A.-L. Barabasi, "Linked: How Everything Is Connected To Everything Else and What It Means for Business, Science, and Everyday Life," PLUME, p. 119, 2003.
    • (2003) , pp. 119
    • Barabasi, A.-L.1
  • 123
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of 'small-world' networks
    • NATURE, June
    • D.J. Watts and S. H. Strogatz, "Collective dynamics of 'small-world' networks," NATURE, 393, June 1998.
    • (1998) , pp. 393
    • Watts, D.J.1    Strogatz, S.H.2
  • 124
    • 85017337265 scopus 로고    scopus 로고
    • CS 3660 projects, Summer
    • CS 3660 projects, Summer 2002.
    • (2002)
  • 125
    • 85017400360 scopus 로고    scopus 로고
    • This analysis follows from the event matrix discussion in Chapter 5
    • This analysis follows from the event matrix discussion in Chapter 5.
  • 126
    • 85017359649 scopus 로고    scopus 로고
    • missing
    • The, outcomes account for another 10% vulnerability
    • The "missing" outcomes account for another 10% vulnerability.
  • 127
    • 85017389143 scopus 로고    scopus 로고
    • Actually, the results in Figure 9.13 were obtained from a magnified version of Figure 9.4
    • Actually, the results in Figure 9.13 were obtained from a magnified version of Figure 9.4.
  • 128
    • 3042585477 scopus 로고    scopus 로고
    • Interim Report: Causes of the August 14th Blackout in the United States and Canada
    • November, U.S.-Canada Power System Outage Task Force
    • "Interim Report: Causes of the August 14th Blackout in the United States and Canada." November 2003, U.S.-Canada Power System Outage Task Force.
    • (2003)
  • 129
    • 4644267563 scopus 로고    scopus 로고
    • Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations
    • April, U.S.-Canada Power System Outage Task Force, dated January 12, 2004
    • "Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations," April 2004. U.S.-Canada Power System Outage Task Force, p. 12 (dated January 12, 2004).https://reports.energy.gov
    • (2004) , pp. 12
  • 130
    • 85017331606 scopus 로고    scopus 로고
    • http://www.aep.com
  • 131
    • 85017340226 scopus 로고    scopus 로고
    • http://www.firstenergycorp.com
  • 132
    • 85017357743 scopus 로고    scopus 로고
    • http://www.spectrum.ieee.org/WEBONLY/special/aug03/tline.html
  • 133
    • 0006250961 scopus 로고    scopus 로고
    • Power and Light: Electricity in the U.S. Energy Infrastructure 1870-1940
    • Corporation for National Research Initiatives
    • A. Friedlander, "Power and Light: Electricity in the U.S. Energy Infrastructure 1870-1940," Corporation for National Research Initiatives, 1996, p. 51. request@cnri.reston.va.us
    • (1996) , pp. 51
    • Friedlander, A.1
  • 134
    • 85017401126 scopus 로고    scopus 로고
    • Personal communication with Joe Weiss
    • Personal communication with Joe Weiss.
  • 135
    • 85017334891 scopus 로고    scopus 로고
    • http://www.eei.org/industry_issues/energy_infrastructure/natural_gas/index.htm
  • 136
    • 85017356008 scopus 로고    scopus 로고
    • http://www.eei.org/industry_issues/energy_infrastructure/natural_gas/index.htm
  • 137
    • 85017337835 scopus 로고    scopus 로고
    • The term supply chain refers to the entire network of companies that work together to design, produce, deliver, and service products
    • According to, Stanford University
    • According to Dr. Warren H. Hausman Stanford University, "The term supply chain refers to the entire network of companies that work together to design, produce, deliver, and service products."http://www.supplychainonline.com/cgi-local/preview/SCM101/1.html
    • Hausman Dr., W.H.1
  • 138
    • 85017363916 scopus 로고    scopus 로고
    • http://www.eia.doe.gov/oiaf/aeo/index.html
  • 139
    • 85017340796 scopus 로고    scopus 로고
    • http://www.pipeline101.com/History/index.html
  • 140
    • 0242413428 scopus 로고    scopus 로고
    • How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation
    • A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December
    • C. J. Trench (ctrench@concentric.net), "How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation," A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December 2001, pp. 8-9. http://www.aopl.org
    • (2001) , pp. 8-9
    • Trench, C.J.1
  • 141
    • 0242413428 scopus 로고    scopus 로고
    • How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation
    • A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December
    • C.J. Trench (ctrench@concentric.net), "How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation," A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December 2001, http://www.aopl.org
    • (2001)
    • Trench, C.J.1
  • 142
    • 0242413428 scopus 로고    scopus 로고
    • How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation
    • A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December
    • C. J. Trench (ctrench@concentric.net), "How Pipelines Make the Oil Market Work-Their Networks,Operation and Regulation," A memorandum prepared for the Association of Oil Pipe Lines and the American Petroleum Institute's Pipeline Committee, December 2001, http://www.aopl.org, pp. 15-16.
    • (2001) , pp. 15-16
    • Trench, C.J.1
  • 143
    • 85017369664 scopus 로고    scopus 로고
    • National Petroleum Council, Meeting the Challenge of the Nation's Growing Natural Gas Demand, December
    • National Petroleum Council, Meeting the Challenge of the Nation's Growing Natural Gas Demand, December 1999.
    • (1999)
  • 144
    • 85017368108 scopus 로고    scopus 로고
    • http://www.shellpipeline.com/cd_maps/SPL403_D_gc_crude_f.pdf
  • 145
    • 85017367304 scopus 로고    scopus 로고
    • A red team consisting of two U.S. Navy officers, two civilian analysts,Bill Brickner and Kristen Pearson, did this analysis
    • A red team consisting of two U.S. Navy officers, Charles Hurst and John Cardillo, two civilian analysts,Bill Brickner and Kristen Pearson, did this analysis.
    • Hurst, C.1    Cardillo, J.2
  • 146
    • 85017351640 scopus 로고    scopus 로고
    • Operations Analysis
    • Professors, Naval Postgraduate School, Fall
    • Professors Brown and Carlyle, Operations Analysis, Naval Postgraduate School, Fall 2003.
    • (2003)
    • Brown1    Carlyle2
  • 147
    • 85017372747 scopus 로고    scopus 로고
    • At the time, the average pump price of gasoline was $1.50/gallon
    • At the time, the average pump price of gasoline was $1.50/gallon.
  • 148
    • 85017342801 scopus 로고    scopus 로고
    • April 1
    • http://www.usdoj.gov/, April 1, 2003.
    • (2003)
  • 149
    • 85017391401 scopus 로고    scopus 로고
    • http://www.pipelinesafetyfoundation.org/
  • 150
    • 85017385592 scopus 로고    scopus 로고
    • http://www.ops.dot.gov
  • 151
    • 85017405269 scopus 로고    scopus 로고
    • A complete network analysis is left for the reader
    • A complete network analysis is left for the reader.
  • 152
    • 85017387914 scopus 로고    scopus 로고
    • http://www.pipelinesafetyfoundation.org
  • 153
    • 85017336604 scopus 로고    scopus 로고
    • http://www.whitehouse.gov/news/releases/2001/06/energyinit.html.
  • 154
    • 85017383523 scopus 로고    scopus 로고
    • http://www.acmi.net.au/AIC/BELL_BIO.html
  • 155
    • 85017367323 scopus 로고    scopus 로고
    • http://www-t.zhwin.ch/it/su/Block3/TelephoneHistory/history2.htm
  • 156
    • 85017382016 scopus 로고    scopus 로고
    • http://www.att.com/history/history3.html
  • 157
    • 85017354579 scopus 로고    scopus 로고
    • It may seem strange then that the Federal Government does NOT regulate the Internet, which is digital communication technology in the most precise definition of the phrase!
    • It may seem strange then that the Federal Government does NOT regulate the Internet, which is digital communication technology in the most precise definition of the phrase!
  • 158
    • 85017366892 scopus 로고    scopus 로고
    • http://www.ncs.gov/n5_hp/Customer_Service/Brochures/35Anniversary/begina.htm
  • 159
    • 85017338993 scopus 로고    scopus 로고
    • http://www.ncs.gov/n5_hp/Customer_Service/Brochures/35Anniversary/begina.htm
  • 160
    • 85017357248 scopus 로고    scopus 로고
    • http://www.ncs.gov/cwin/
  • 161
    • 85017371210 scopus 로고    scopus 로고
    • Satellites in Cyberspace
    • Datacomm Research Company
    • Datacomm Research Company, "Satellites in Cyberspace," http://www.researchandmarkets.com/ index.asp
  • 162
    • 18744391816 scopus 로고
    • October
    • Wireless World, pp. 305-308, October 1945.
    • (1945) Wireless World , pp. 305-308
  • 163
    • 85017376115 scopus 로고    scopus 로고
    • http://www.hq.nasa.gov/office/pao/History/satcomhistory.html
  • 164
    • 85017354700 scopus 로고    scopus 로고
    • http://roland.lerc.nasa.gov/dglover/sat/telstar.html
  • 165
    • 85017342030 scopus 로고    scopus 로고
    • http://www.stratosglobal.com/caseStudies/usLawEnforcement.html
  • 166
    • 85017370627 scopus 로고    scopus 로고
    • http://www.ieee.org/organizations/history_center/milestones_photos/telstar_ukri.html
  • 167
    • 85017376077 scopus 로고    scopus 로고
    • http://www.ncafe.com/chris/pat2/
  • 168
    • 85017342952 scopus 로고    scopus 로고
    • http://www.gsmcoverage.co.uk/maps/europe/gsm_cdma_map.jpg
  • 169
    • 85017343885 scopus 로고    scopus 로고
    • http://www.mouthshut.com/readreview/34613-1.html
  • 170
    • 85017368067 scopus 로고    scopus 로고
    • http://www.mouthshut.com/readreview/34613-1.html
  • 171
    • 85017383030 scopus 로고    scopus 로고
    • http://www.bcr.com/bcrmag/2003/01/p11.asp
  • 172
    • 85017392912 scopus 로고    scopus 로고
    • http://www.carrierhotels.com
  • 173
    • 85017340596 scopus 로고    scopus 로고
    • March 13
    • Richard Clarke, March 13, 2002.
    • (2002)
    • Clarke, R.1
  • 174
    • 56349113271 scopus 로고    scopus 로고
    • Vulnerabilities Task Force Report Concentration of Assets: Telecom Hotels
    • The president's National Security Telecommunications Advisory Committee, February 12
    • The president's National Security Telecommunications Advisory Committee, "Vulnerabilities Task Force Report Concentration of Assets: Telecom Hotels," February 12, 2003.
    • (2003)
  • 175
    • 85017334690 scopus 로고    scopus 로고
    • Identifying the risk involved in allowing wireless, portable devices into your company
    • SANS Institute
    • C. McDonough, "Identifying the risk involved in allowing wireless, portable devices into your company," SANS Institute, 2003, p. 6.
    • (2003) , pp. 6
    • McDonough, C.1
  • 176
    • 85017362909 scopus 로고    scopus 로고
    • Jammers block access to a cell phone's radio tower by transmitting a high-powered signal on the same frequency, thus canceling the phone's signal. The result: a poor or erased signal
    • Jammers block access to a cell phone's radio tower by transmitting a high-powered signal on the same frequency, thus canceling the phone's signal. The result: a poor or erased signal.
  • 177
    • 85017400835 scopus 로고    scopus 로고
    • Cell Phone Jammers, Illegal in U.S., Can Create Silent Zones
    • M. Wylie, "Cell Phone Jammers, Illegal in U.S., Can Create Silent Zones," 2000. http://www.newhouse.com/archive/story1a092200.html
    • (2000)
    • Wylie, M.1
  • 178
    • 85017335607 scopus 로고    scopus 로고
    • Encarta World English Dictionary #, Microsoft Corporation. All rights reserved. Developed for Microsoft by Bloomsbury Publishing Plc
    • Encarta World English Dictionary # 1999 Microsoft Corporation. All rights reserved. Developed for Microsoft by Bloomsbury Publishing Plc.
    • (1999)
  • 179
    • 85017369429 scopus 로고    scopus 로고
    • http://www.ntia.doc.gov/ntiahome/dn/html/Chapter2.htm
  • 180
    • 85017347256 scopus 로고    scopus 로고
    • According to Nielsen/NetRatings, there was a worldwide Internet population of 580 million users, as of, The International Telecommunications Union estimates 665 million users
    • According to Nielsen/NetRatings, there was a worldwide Internet population of 580 million users, as of 2002. The International Telecommunications Union estimates 665 million users.
    • (2002)
  • 181
    • 85017372475 scopus 로고    scopus 로고
    • An autonomous system (AS) is a collection of Internet routers and switches under a single administrative control, such as an ISP
    • An autonomous system (AS) is a collection of Internet routers and switches under a single administrative control, such as an ISP.
  • 182
    • 1542380420 scopus 로고    scopus 로고
    • Modeling Diffusion of Technology Generations
    • Bass Economics Working Paper
    • P. I. Bass and F. M. Bass, Modeling Diffusion of Technology Generations, Bass Economics Working Paper, 2001, http://www.basseconomics.com
    • (2001)
    • Bass, P.I.1    Bass, F.M.2
  • 183
    • 0003916843 scopus 로고    scopus 로고
    • Where Wizards Stay Up Late: The Origins of the Internet
    • Simon & Schuster, New York
    • K. Hafner and M. Lyon, "Where Wizards Stay Up Late: The Origins of the Internet," Simon & Schuster, New York, p. 304, 1996.
    • (1996) , pp. 304
    • Hafner, K.1    Lyon, M.2
  • 184
    • 0003916843 scopus 로고    scopus 로고
    • Where Wizards Stay Up Late: The Origins of the Internet
    • Simon & Schuster, New York
    • K. Hafner and M. Lyon, "Where Wizards Stay Up Late: The Origins of the Internet," Simon & Schuster, New York, p. 304, 1996, p. 20.
    • (1996)
    • Hafner, K.1    Lyon, M.2
  • 185
    • 0003916843 scopus 로고    scopus 로고
    • Where Wizards Stay Up Late: The Origins of the Internet
    • Simon & Schuster, New York
    • K. Hafner and M. Lyon, "Where Wizards Stay Up Late: The Origins of the Internet," Simon & Schuster, New York, p. 304, 1996, p. 38.
    • (1996)
    • Hafner, K.1    Lyon, M.2
  • 186
    • 85017384697 scopus 로고
    • Paul Mockapetris2 of USC/ISI invents DNS with the help of Jon Postel and Craig Partridge
    • Paul Mockapetris2 of USC/ISI invents DNS with the help of Jon Postel and Craig Partridge in 1983.
    • (1983)
  • 187
    • 85017368635 scopus 로고    scopus 로고
    • An IP number corresponds to the network and specific machine that is connected to the network
    • An IP number corresponds to the network and specific machine that is connected to the network.
  • 188
    • 85017375279 scopus 로고    scopus 로고
    • DNS machine locations are secret because they are the anchor of the Internet
    • DNS machine locations are secret because they are the anchor of the Internet.
  • 189
    • 85017368405 scopus 로고    scopus 로고
    • http://www.postel.org/postel.html
  • 190
    • 85017374208 scopus 로고    scopus 로고
    • http://www.rfc-archive.org/
  • 191
    • 85017355027 scopus 로고    scopus 로고
    • This is called CSMA/CD or Carrier Sense Multiple Access/Collision Detection
    • This is called CSMA/CD or Carrier Sense Multiple Access/Collision Detection.
  • 192
    • 85017364726 scopus 로고    scopus 로고
    • Cisco Systems, one of the most successful companies to commercialize TCP/IP equipment, was founded in 1984 by Leonard Bosack and Sandra Lerner, who later sold their interests in the company for $170 million
    • Cisco Systems, one of the most successful companies to commercialize TCP/IP equipment, was founded in 1984 by Leonard Bosack and Sandra Lerner, who later sold their interests in the company for $170 million.
  • 193
    • 85017382641 scopus 로고    scopus 로고
    • http://www.ibiblio.org/pioneers/andreesen.html
  • 194
    • 85017370883 scopus 로고    scopus 로고
    • In, AOL paid $10 billion in stock for 5-year-old Netscape
    • In 1999, AOL paid $10 billion in stock for 5-year-old Netscape.
    • (1999)
  • 195
    • 85017394455 scopus 로고    scopus 로고
    • It took 67 years for the public telephone to penetrate 50% of the homes in the United States
    • It took 67 years for the public telephone to penetrate 50% of the homes in the United States.
  • 196
    • 85017374722 scopus 로고    scopus 로고
    • It took 67 years for the public telephone to penetrate 50% of the homes in the United States1/4 Internet Engineering Task Force; IRTF 1/4 Internet Research Task Force
    • It took 67 years for the public telephone to penetrate 50% of the homes in the United States1/4 Internet Engineering Task Force; IRTF 1/4 Internet Research Task Force.
  • 197
    • 85017391621 scopus 로고    scopus 로고
    • http://www.faqs.org/rfcs/rfc3233.html
  • 198
    • 85017353228 scopus 로고    scopus 로고
    • http://www.faqs.org/rfcs/rfc3710.html
  • 200
    • 85017371330 scopus 로고    scopus 로고
    • http://www.icannwatch.org/
  • 202
    • 85017376329 scopus 로고    scopus 로고
    • http://www.circleid.com/channel/index/C0_1_1/
  • 203
    • 85017380032 scopus 로고    scopus 로고
    • http://www.isoc.org/
  • 204
    • 85017402294 scopus 로고    scopus 로고
    • http://www.w3.org/
  • 205
    • 85017390514 scopus 로고    scopus 로고
    • Analysis of Autonomous Systems
    • Technical Report: Computer Architecture Department, Polytechnic University of Catalonia, Barcelona, Spain
    • J.I. Nieto-Hipolita, and J. M. Borcelo, "Analysis of Autonomous Systems," Technical Report: Computer Architecture Department, Polytechnic University of Catalonia, Barcelona, Spain, 2002.
    • (2002)
    • Nieto-Hipolita, J.I.1    Borcelo, J.M.2
  • 206
    • 85017397503 scopus 로고    scopus 로고
    • The Example in Figure 12.6 can be found in the program, a.k.a. NA.jar
    • The Example in Figure 12.6 can be found in the program NetworkAnalsys.html, a.k.a. NA.jar.
  • 207
    • 85017384827 scopus 로고    scopus 로고
    • One can easily argue that the printing press was the most significant advancement in communications before the Internet
    • One can easily argue that the printing press was the most significant advancement in communications before the Internet.
  • 208
    • 85017349841 scopus 로고    scopus 로고
    • http://www.gocsi.com
  • 209
    • 85017348622 scopus 로고    scopus 로고
    • Script kiddies are amateurs out for fun and glory. Black-hats are serious professionals working for financial gain
    • Script kiddies are amateurs out for fun and glory. Black-hats are serious professionals working for financial gain.
  • 210
    • 85017385904 scopus 로고    scopus 로고
    • A worm is a self-activating program that spreads through a computer network like an epidemic
    • A worm is a self-activating program that spreads through a computer network like an epidemic.
  • 211
    • 84870226450 scopus 로고    scopus 로고
    • Protection of Critical Infrastructures: A New Perspective
    • CERT Analysis Center
    • C.J. Dunlevy, "Protection of Critical Infrastructures: A New Perspective," CERT Analysis Center, 2004, http://www.cert.org
    • (2004)
    • Dunlevy, C.J.1
  • 212
    • 85017396046 scopus 로고    scopus 로고
    • exploits
    • Use the keyword, a search engine such as, a very large number of cyber-threats will be retrieved
    • Use the keyword "exploits" in a search engine such as http://www.google.com a very large number of cyber-threats will be retrieved.
  • 214
    • 85017389617 scopus 로고    scopus 로고
    • The Web is somewhat like most of the power grid in this respect
    • The Web is somewhat like most of the power grid in this respect.
  • 215
    • 37649029105 scopus 로고    scopus 로고
    • Email Networks and the Spread of Computer Viruses
    • Physical Review E
    • M.E.J. Newman, S. Forrest, and J. Balthrop, "Email Networks and the Spread of Computer Viruses," Physical Review E, 66, 035101-(R), 2002.
    • (2002) , vol.66 , pp. 035101
    • Newman, M.E.J.1    Forrest, S.2    Balthrop, J.3
  • 216
    • 85017379243 scopus 로고    scopus 로고
    • MafiaBoy caused and estimated $1.7 billion in lost revenues, but its perpetrator was fined only $250 and sentenced to 8 months in jail
    • MafiaBoy caused and estimated $1.7 billion in lost revenues, but its perpetrator was fined only $250 and sentenced to 8 months in jail.
  • 217
    • 85017359210 scopus 로고    scopus 로고
    • Macros are written in Visual Basic and activated by the user whenever the document is loaded into an Office application
    • Macros are written in Visual Basic and activated by the user whenever the document is loaded into an Office application.
  • 218
    • 85017398931 scopus 로고    scopus 로고
    • e-mail
    • SYN is short for synchronize and ACK is short for acknowledge-two hold-over signals from the days of teletypes and Western Union, delivery
    • SYN is short for synchronize and ACK is short for acknowledge-two hold-over signals from the days of teletypes and Western Union "e-mail" delivery.
  • 219
    • 85017363595 scopus 로고    scopus 로고
    • Spoofing means that source address of packets returned from DNS are changed to something else, which changes the identity of the sender
    • Spoofing means that source address of packets returned from DNS are changed to something else, which changes the identity of the sender.
  • 220
    • 85017381963 scopus 로고    scopus 로고
    • The registry is where Windows keeps the names and authorizations for every program that is allowed to run on a Windows machine
    • The registry is where Windows keeps the names and authorizations for every program that is allowed to run on a Windows machine.
  • 221
    • 85017365078 scopus 로고    scopus 로고
    • A session and an application is almost identical, so hacking an open session is tantamount to hacking a running application
    • A session and an application is almost identical, so hacking an open session is tantamount to hacking a running application.
  • 222
    • 85017394062 scopus 로고    scopus 로고
    • http://www.avast.com
  • 223
    • 0008783791 scopus 로고    scopus 로고
    • Cyber Attacks During the War on Terrorism: A Predictive Analysis
    • Institute for Security Technology Studies, Dartmouth College, September 22, 45 Lyme Road, Hanover, NH 03755
    • M.Vatis, "Cyber Attacks During the War on Terrorism: A Predictive Analysis," Institute for Security Technology Studies, Dartmouth College, September 22, 2001, 45 Lyme Road, Hanover, NH 03755,http://www.ists.dartmouth.edu/ISTS
    • (2001)
    • Vatis, M.1
  • 224
    • 14844325969 scopus 로고    scopus 로고
    • Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
    • Center for Strategic and International Studies, Washington, D.C., December
    • J.A. Lewis, "Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats," Center for Strategic and International Studies, Washington, D.C., December 2002. http://www.csis.org
    • (2002)
    • Lewis, J.A.1
  • 225
    • 85017396576 scopus 로고    scopus 로고
    • http://www.gocsi.com
  • 226
    • 85017353828 scopus 로고    scopus 로고
    • HR 4246 introduced into the 106th Congress, 2nd session, April
    • HR 4246 introduced into the 106th Congress, 2nd session, April 2000.
    • (2000)
  • 227
    • 85017348461 scopus 로고    scopus 로고
    • A trusted path is a mechanism by which a person using a terminal can communicate directly with the TCB.The TP can only be activated by the person or the TCB and cannot be imitated by untrusted software
    • A trusted path is a mechanism by which a person using a terminal can communicate directly with the TCB.The TP can only be activated by the person or the TCB and cannot be imitated by untrusted software.
  • 228
    • 85017367218 scopus 로고    scopus 로고
    • FIPS is the Federal Information Processing Standard
    • FIPS is the Federal Information Processing Standard.
  • 229
    • 85017381066 scopus 로고    scopus 로고
    • Sally always tells the truth," and Sally says, "Tom always lies." Is Sally lying now?
    • Deciding whether a computer system is secure has been shown to be impossible, by mathematical logic.Consider the following paradox: Tom says, It is impossible to decide. In a similar fashion, system security can be shown to be undecidable
    • Deciding whether a computer system is secure has been shown to be impossible, by mathematical logic.Consider the following paradox: Tom says, "Sally always tells the truth," and Sally says, "Tom always lies." Is Sally lying now? It is impossible to decide. In a similar fashion, system security can be shown to be undecidable.
  • 230
    • 85017340486 scopus 로고    scopus 로고
    • Cracking is the process of illegally decoding ciphertext into plaintext
    • Cracking is the process of illegally decoding ciphertext into plaintext.
  • 231
    • 85017358660 scopus 로고    scopus 로고
    • Virtual Private Network. A network that uses the Internet rather than leased lines for connections. Security is guaranteed by means of a, connection in which the entire TCP/IP packet (content and addresses) is encrypted and encapsulated
    • Virtual Private Network. A network that uses the Internet rather than leased lines for connections. Security is guaranteed by means of a tunnel connection in which the entire TCP/IP packet (content and addresses) is encrypted and encapsulated.
    • tunnel
  • 232
    • 85017405074 scopus 로고    scopus 로고
    • LDAP-defined by the IETF-defines a relatively simple protocol for updating and searching directories running over TCP/IP
    • LDAP-defined by the IETF-defines a relatively simple protocol for updating and searching directories running over TCP/IP.
  • 233
    • 85017377084 scopus 로고    scopus 로고
    • A simple definition of cryptology is the study of secret messages
    • A simple definition of cryptology is the study of secret messages.
  • 234
    • 85017337350 scopus 로고    scopus 로고
    • http://library.thinkquest.org/27158/concept2_1.html
  • 235
    • 85017332618 scopus 로고    scopus 로고
    • Moore's Law says processing speed doubles every 1.5 years. So, 1.5 _ 112 1/4 168
    • Moore's Law says processing speed doubles every 1.5 years. So, 1.5 _ 112 1/4 168.
  • 236
    • 4344714801 scopus 로고    scopus 로고
    • AES Proposal: Rijndael, AES Algorithm Submission
    • September 3
    • J.Daemen and V. Rijmen, "AES Proposal: Rijndael, AES Algorithm Submission," September 3, 1999,http://www.nist.gov/CryptoToolkit
    • (1999)
    • Daemen, J.1    Rijmen, V.2
  • 237
    • 0017018484 scopus 로고
    • New Directions In Cryptography
    • IEEE Transactions on Information Theory, November
    • W. Diffie and M. Hellman, "New Directions In Cryptography," IEEE Transactions on Information Theory, vol. IT-22(6), pp. 644-654, November 1976.
    • (1976) , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 238
    • 85017403249 scopus 로고    scopus 로고
    • The Phil Zimmerman Case
    • C.Gimon, "The Phil Zimmerman Case," http://www.skypoint.com/members/gimonca/philzima.html
    • Gimon, C.1
  • 239
    • 0004196798 scopus 로고
    • On Digital Signatures and Public Key Cryptosystems
    • MIT Laboratory for Computer Science Technical Memorandum 82, April
    • R.L. Rivest, A. Shamir, and L. Adelman, "On Digital Signatures and Public Key Cryptosystems," MIT Laboratory for Computer Science Technical Memorandum 82, April 1977.
    • (1977)
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.3
  • 240
    • 85017402753 scopus 로고    scopus 로고
    • Public key encryption uses numbers in excess of 200 digits long!
    • Public key encryption uses numbers in excess of 200 digits long!
  • 241
    • 85017388794 scopus 로고    scopus 로고
    • A prime number is a positive number that is divisible by one and itself only. Prime numbers can be found by computerized mathematical sieve techniques that take time proportional to the size of the prime number
    • A prime number is a positive number that is divisible by one and itself only. Prime numbers can be found by computerized mathematical sieve techniques that take time proportional to the size of the prime number.
  • 242
    • 85017343277 scopus 로고    scopus 로고
    • RSA.java can be found on the Web or the disk accompanying this book
    • RSA.java can be found on the Web or the disk accompanying this book.
  • 243
    • 85017360499 scopus 로고    scopus 로고
    • http://www.linktionary.com/p/pki.html
  • 244
    • 85017390769 scopus 로고    scopus 로고
    • Defining boundaries among LDAP directories, authentication, and PKI is a moving target because these technologies seem to be merging into a comprehensive system of security
    • Defining boundaries among LDAP directories, authentication, and PKI is a moving target because these technologies seem to be merging into a comprehensive system of security.
  • 245
    • 84931400962 scopus 로고    scopus 로고
    • Cyber security-Growing Risk from Growing Vulnerability
    • CERT, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. Testimony given before the House Select Committee on Homeland Security Subcommittee on Cybersecurity, Science, and Research and Development,June 25
    • R.D. Pethia, "Cyber security-Growing Risk from Growing Vulnerability," CERT, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. Testimony given before the House Select Committee on Homeland Security Subcommittee on Cybersecurity, Science, and Research and Development,June 25, 2003. http://hsc.house.gov/files/Testimony.pethia.pdf
    • (2003)
    • Pethia, R.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.