• Hacking back across third party systems is more self help than self defense (rarely is the command and control computer linked directly to the system being attacked).

    FORBES: Caution: Active Response to Cyber Attacks Has High Risk

  • According to reports, the plan calls for creating three types of forces under the Cyber Command: protecting computer systems that involve electrical grids and other kinds of infrastructure, offensive operations overseas as well as protection of the defence department's internal systems.

    BBC: US Cyber Command in 'fivefold' staff expansion

  • XML, the human voice becomes a substitute for a computer mouse and the spoken command for a click.

    ECONOMIST: Internet

  • One important issue is whether Cyber Command will get the authority to identify computer users who may have malicious intent.

    NPR: U.S. Seeks To Define Rules On Cyberwar

  • Unlike past viruses that have hijacked armies of PCs, Storm doesn't place the command and control of the network in a single computer.

    FORBES: Zombie Storm Rising

  • Anderson told attendees that the U.S. Space Command, the agency in charge of satellite communications, has begun to craft a computer network attack strategy.

    CNN: U.S. Army kick-starts cyberwar machine

  • For the techie on your list, try In the Beginning Was the Command Line by Neal Stephenson, his extended essay on the relationship between culture and the computer.

    NPR: The Least Material of Material Gifts

  • Unlike other botnets, Storm has no single command-and-control point--it functions as a peer-to-peer system where any hijacked computer can give and receive commands.

    FORBES: Storm For Rent

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定