Introduction to cyber-warfare a multidisciplinary approach
This book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well .It provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and sci...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress is an imprint of Elsevier
© 2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 100721 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025544.0 | ||
| 008 | 221104 2013 maua bi 000 0 eng d | ||
| 020 | |a 9780124078147 | ||
| 039 | 9 | |a 202211041125 |b VLOAD |c 201411200841 |d faezah |c 201411191159 |d faezah |y 201410132052 |z syarifuddin | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a U 163 |b .S43 2013 | ||
| 100 | 1 | |a Shakarian, Paulo |e author | |
| 245 | 1 | 0 | |a Introduction to cyber-warfare |b a multidisciplinary approach |c Paulo Shakarian, Jana Shakarian & Andrew Ruef |
| 264 | 1 | |a Waltham, MA |b Syngress is an imprint of Elsevier |c © 2013 | |
| 300 | |a xvii, 318 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a 1.Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I.Cyber Attack -- 2.Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3.How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4.When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5.Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6.Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II.Cyber Espionage And Exploitation -- 7.Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8.Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- ommonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9.Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10.How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III.Cyber Operations For Infrastructure Attack -- 11.Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12.Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13.Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future | |
| 520 | |a This book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well .It provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) | ||
| 592 | |a 00013726 |b 04/11/2014 |c RM 199.80 |h PVK | ||
| 650 | 0 | |a Computer crimes | |
| 650 | 0 | |a Cyberspace |x Security measures | |
| 650 | 0 | |a Cyberterrorism | |
| 650 | 0 | |a Data protection | |
| 650 | 0 | |a Information warfare |v Case studies | |
| 700 | 1 | |a Shakarian, Jana |e author | |
| 700 | 1 | |a Ruef, Andrew |e author | |
| 999 | |a vtls000052958 |c 100721 |d 100721 | ||


