TAILIEUCHUNG - Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

Data analysis tools are the core of the NSM suite; these are the tools which actually detect and support analyses of intrusive activity. With the exception of the GUI_nsm, these are post-mortem tools to investigate data already saved to disk. In addition to analyzing data collected by one of the NSM’s data capture tools, these post-mortem tools can also analyze data collected by TCPdump. Support tools manipulate existing data to support further analysis and enable the other NSM tools. tcpdump_conv will convert data saved by the tcpdump program into data which can be analyzed by the NSM tools | Capability of the People s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and Security Review Commission Project Manager Steve DeWeese Principal Author Bryan Krekel Subject Matter Experts George Bakos Christopher Barnett Northrop Grumman Corporation Information Systems Sector 7575 Colshire Drive McLean VA 22102 October 9 2009 US-China Economic and Security Review Commission Report on the Capability of the People s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review Commission Report on the Capability of the People s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Table of Contents Scope Executive Chinese Computer Network Operations Chinese Computer Network Operations During Key Entities in Chinese Computer Network Operational Profile of An Advanced Cyber Timeline of Significant Chinese Related Cyber Events Chronology of Alleged Chinese Computer Network Exploitation Events Targeting US and Foreign Commonly Used Glossary of Technical

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.