Library Logo
Normal view MARC view ISBD view

Cyberwar. Bill Burke.

by Burke, Bill; ProQuest Information and Learning Company.
Series: SIRS Enduring Issues 2006Article 72Science. Publisher: Virginian-Pilot, 2005ISSN: 1522-3264;.Subject(s): Computer hackers | Computer security | Cyberterrorism | Internet crimes | U.S. Dept. of Defense | U.S. Navy -- Communication systemsDDC classification: 050 Summary: "On a Thursday morning in May [2005], as some three dozen sailors in uniform and a handful of tieless civilians gathered around, the briefing officer delivered the news: There had been a Category 1 incident at a large local Navy installation. For the assembled group, a Category 1 was serious business--not the low end of the scale, like the one hurricane trackers use. Someone out there in cyberspace had seized control of a couple of the Navy's network computers. Incidents of this magnitude could damage equipment, scramble data or even result in harm to sailors." (VIRGINIAN-PILOT) This article describes cyberattacks on Navy computers and examines how the Navy is fighting these attacks.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due
Books Books High School - old - to delete
REF SIRS 2006 Science Article 72 (Browse shelf) Available

Articles Contained in SIRS Enduring Issues 2006.

Originally Published: Cyberwar, June 26, 2005; pp. A1+.

"On a Thursday morning in May [2005], as some three dozen sailors in uniform and a handful of tieless civilians gathered around, the briefing officer delivered the news: There had been a Category 1 incident at a large local Navy installation. For the assembled group, a Category 1 was serious business--not the low end of the scale, like the one hurricane trackers use. Someone out there in cyberspace had seized control of a couple of the Navy's network computers. Incidents of this magnitude could damage equipment, scramble data or even result in harm to sailors." (VIRGINIAN-PILOT) This article describes cyberattacks on Navy computers and examines how the Navy is fighting these attacks.

Records created from non-MARC resource.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha