Cyber Warfare and Cyber TerrorismJanczewski, Lech, Colarik, Andrew Idea Group Inc (IGI), 31 мая 2007 г. - Всего страниц: 564 Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks. |
Результаты поиска по книге
Результаты 1 – 5 из 74
... Access Control Chapter XXXVI Hacking and Eavesdropping / Kevin Curran, Peter Breslin, Kevin McLaughlin, and Gary Tracey ...................307 Chapter XXXVII Access Control Models / Romuald Thion ...
... control systems. The global information infrastructure sustains our westernized economic and military superiority as ... access continues to be the second-greatest source of financial loss. • Financial losses related to laptops (or ...
... access to a vast storage of information resources for the creation of new ... control these changes and compete in this unifying environment. The ... access to the opportunities that lie ahead from its mastery or it is to undermine and/or ...
... control the basic choice of systems and protective mechanisms of any given ... access to system resources than outsiders in most configured systems and ... access control, system programmers and developers ultimately tend to have the ...
... control of parts of the visitor's system. These tools can then be used to read and execute files on the visitor's system in order to access information such as user account details (i.e., full user name, logon name, e-mail addresses ...
Содержание
1 | |
7 | |
17 | |
26 | |
Chapter V Infrastructures of Cyber Warfare | 35 |
Chapter VI Terrorism and the Internet | 42 |
Chapter VII Steganography | 50 |
Chapter VIII Cryptography | 57 |
Prevention Intrusion Detection and Mitigation | 262 |
Chapter XXXII LargeScale Monitoring of Critical Digital Infrastructures | 273 |
Chapter XXXIII Public Key Infrastructures as a Means for Increasing Network Security | 281 |
Chapter XXXIV Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism | 291 |
Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism | 298 |
Section V Identification Authorization and Access Control | 305 |
Chapter XXXVI Hacking and Eavesdropping | 307 |
Chapter XXXVII Access Control Models | 318 |
Chapter IX A Roadmap for Delivering Trustworthy IT Processes | 65 |
Section II Dynamic Aspects of Cyber Warfare and Cyber Terrorism | 76 |
Chapter X An Introduction to Key Themes in the Economics of Cyber Security | 78 |
Chapter XI Role of FSISAC in Countering Cyber Terrorism | 83 |
Chapter XII Deception in Cyber Attacks | 91 |
Chapter XIII Deception in Defense of Computer Systems from Cyber Attack | 97 |
Chapter XIV Ethics of Cyber War Attacks | 105 |
Approaches for Oversight | 112 |
Chapter XVI NetworkBased Passive Information Gathering | 120 |
Chapter XVII Electronic Money Management in Modern Online Businesses | 129 |
Chapter XVIII The Analysis of Money Laundering Techniques | 138 |
Chapter XIX Spam Spim and Illegal Advertisement | 146 |
Specialized Trojan Horse | 154 |
The Most Prevalent Technique for Attacking Web Powered Databases | 161 |
Section III Human Aspects of Cyber Warfare and Cyber Terrorism | 171 |
Chapter XXII Electronic Surveillance and Civil Rights | 173 |
Chapter XXIII Social Engineering | 182 |
Chapter XXIV Social Engineering | 191 |
Chapter XXV Behavioral Information Security | 199 |
Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection | 206 |
A Challenge for Web Security | 216 |
Section IV Technical Aspects of Handling Cyber Attacks | 226 |
Chapter XXVIII Cyber Security Models | 228 |
Systems Development with Integrated Security | 241 |
Chapter XXX Antispam Approaches Against Information Warfare | 254 |
Chapter XXXVIII An Overview of IDS Using Anomaly Detection | 327 |
A New Mode of Authentication Access Using Visual Evoked Potentials | 338 |
Chapter XL ContentBased Policy Specification for Multimedia Authorization and Access Control Model | 345 |
Chapter XLI Data Mining | 358 |
Chapter XLII Identification and Localization of Digital Addresses on the Internet | 366 |
Chapter XLIII Identification Through Data Mining | 374 |
Section VI Business Continuity | 381 |
Chapter XLIV A Model for Emergency Response Systems | 383 |
Chapter XLV Bouncing Techniques | 392 |
Chapter XLVI Cyber Forensics | 397 |
Chapter XLVII Software Component Survivability in Information Warfare | 403 |
Chapter XLVIII Taxonomy for Computer Security Incidents | 412 |
National and International Responses | 418 |
The European Response | 420 |
Chapter L EU Tackles Cybercrime | 431 |
Chapter LI The US Military Response to Cyber Warfare | 439 |
Chapter LII USAs View on World Cyber Security Issues | 446 |
Chapter LIII ECHELON and the NSA | 453 |
Chapter LIV International Cybercrime Convention | 469 |
Epilogue | 477 |
Glossary | 479 |
Compilation of References | 483 |
About the Editors | 528 |
Index | 529 |