Building Secure, Resilient Architectures for Cyber Mission Assurance

Free registration required

Executive Summary

Today's Information Technology (IT) environments are increasingly subject to escalating cyber attacks. Cyber threats vary widely in sophistication, intent, and the consequences to the targeted systems and networks. The range of attackers extends from users who unintentionally damage systems to hackers, to cyber criminals, to full-scale cyber spies and cyber warriors; their intentions span from annoying vandalism to economic threats to taking out the electric grid or defeating armed forces. Similarly, the target of the attacks can vary from a single computer or router to an entire on-line banking system, business enterprise, or global supply chain.

  • Format: PDF
  • Size: 464.91 KB