شاركنا تاريخ ميلادك!
تاريخ الميلاد
تاريخ الميلاد المدخل غير مكتمل يرجى ادخال تاريخ ميلاد صحيح
×
Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for Dod to Develop Full-Spectrum Cyberspace Budget Estimates: Gao-1 by U. S. Government Accountability Office ( - Paperback
84.78 درهم

Defense Department Cyber Efforts: Definitions, Focal Point, and Methodology Needed for Dod to Develop Full-Spectrum Cyberspace Budget Estimates: Gao-1 by U. S. Government Accountability Office ( - Paperback

كن أول من يقيِّم هذا المنتج 

84.78 درهم 

  - ستوفر -84.78 درهم
الأسعار تشمل ضريبة القيمة المضافة  التفاصيل
رقم ال ISBN
9781287162537
الفئات
سياسة
الكاتب
U. S. Government Accountability Office (
الناشر
Bibliogov
الوصف:

This letter discusses the Department of Defense's (DOD) cyber and information assurance budget for fiscal year 2012 and future years defense spending. The objectives of this review were to (1) assess the extent to which DOD has prepared an overarching budget estimate for full-spectrum cyberspace operations across the department; and (2) identify the challenges DOD has faced in providing ...

تشحن من الولايات المتحدة
اشحن الى دبي (تغيير المدينة)
التوصيل خلال الثلاثاء ٢٨ أغسطس - الخميس ٣٠ أغسطس الي دبي

حالة السلعة:
جديدة
البائع:
InternationalBookStore (87% تقييم ايجابي)

معلومات المنتج

  •  

    المواصفات

    رقم ال ISBN
    9781287162537
    الفئات
    سياسة
    الرقم المميز للسلعة
    2724352540646
    المؤلفين
    الكاتب
    U. S. Government Accountability Office (
    المؤلفين
    الناشر
    Bibliogov
    رقم ال ISBN
    9781287162537
    الفئات
    سياسة
    الرقم المميز للسلعة
    2724352540646
    المؤلفين
    الكاتب
    U. S. Government Accountability Office (
    المؤلفين
    الناشر
    Bibliogov
    معلومات تقنية
    غلاف الكتاب
    غلاف عادي
    اللغات والبلدان
    لغة الكتاب
    الانجليزية
    إقرأ المزيد
  •  

    الوصف:

    This letter discusses the Department of Defense's (DOD) cyber and information assurance budget for fiscal year 2012 and future years defense spending. The objectives of this review were to (1) assess the extent to which DOD has prepared an overarching budget estimate for full-spectrum cyberspace

    This letter discusses the Department of Defense's (DOD) cyber and information assurance budget for fiscal year 2012 and future years defense spending. The objectives of this review were to (1) assess the extent to which DOD has prepared an overarching budget estimate for full-spectrum cyberspace operations across the department; and (2) identify the challenges DOD has faced in providing such estimates. The President has identified the cyber threat as one of the most serious national security challenges that the nation faces. In February 2011 the Deputy Secretary of Defense said that more than 100 foreign intelligence agencies have tried to breach DOD computer networks, and that one was successful in breaching networks containing classified information. To aid its efforts in countering cyberspace threats, DOD established the U.S. Cyber Command in 2010 and is currently undertaking departmentwide efforts to defend against cyber threats. DOD has defined some key cyber-related terms. Cyberspace operations is defined as the employment of cyber capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace. Such operations include computer network operations and activities to operate and defend the global information grid. U.S. Cyber Command defines full-spectrum cyber operations as the employment of the full range of cyberspace operations to support combatant command operational requirements and the defense of DOD information networks. This includes efforts such as computer network defense, computer network attack, and computer network exploitation. Computer network defense is defined as actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within DOD information systems and computer networks. Computer network attack is defined as actions taken to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Computer network exploitation is defined as enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks. Information assurance is defined as measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

    خصائص المنتج:
    • الفئات: سياسة
    • غلاف الكتاب: غلاف عادي
    • لغة الكتاب: الانجليزية
    • الكاتب: U. S. Government Accountability Office (
    • الناشر: Bibliogov
    • رقم ال ISBN: 9781287162537
    • عدد الصفحات: 36
    • لأبعاد (الارتفاع*العرض*العمق): 9.69 x 7.44 x 0.07 inches
 

تقييمات المستخدمين

0
لا يوجد تقييمات بعد
كن أول من يقيِّم هذا المنتج
قيِّم هذا المنتج:

إعلانات مُموَّلة لك

×

الرجاء تأكيد رقم هاتفك الجوال لإكمال عملية الشراء

سنقوم بإرسال رسالة نصية تحتوي على رمز التفعيل، الرجاء التأكد من رقم هاتفك الجوال ادناه، ثم انقر على زر "أرسل رمز التفعيل".