Chapter 13. Cyber-Threats

  1. Professor Ted G. Lewis M.S. Computer Science, Ph.D. Computer Science

Published Online: 30 MAR 2006

DOI: 10.1002/0471789542.ch13

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation

How to Cite

Lewis, T. G. (2006) Cyber-Threats, in Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/0471789542.ch13

Author Information

  1. Naval Postgraduate School, Monterey, California, USA

Publication History

  1. Published Online: 30 MAR 2006
  2. Published Print: 7 APR 2006

ISBN Information

Print ISBN: 9780471786283

Online ISBN: 9780471789543

SEARCH

Keywords:

  • cyber-threat;
  • boot record;
  • e-mail exploits

Summary

This chapter contains sections titled:

  • Script Kiddies and Black-Hats

  • Model-Based Vulnerability Analysis of the Web

  • Tools of the Black-Hat Trade

  • Vulnerability Analysis Continued

  • Analysis

  • Exercises