Cyber Warfare and Cyber TerrorismJanczewski, Lech, Colarik, Andrew Idea Group Inc (IGI), 31 мая 2007 г. - Всего страниц: 564 Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks. |
Результаты поиска по книге
Результаты 1 – 5 из 84
... action aimed at tracing all possible systems that could generate problems during the switch to a new millennium. As a result, no significant accidents occurred at that time around the world. Interestingly, some mass media outlets ...
... actions. If it was intentionally done, for instance as a result of poor relations between these two people, then it would be murder in addition to a cyber crime. If the executor later would announce that he or she is ready to commit ...
... actions and setup a plan to deal with it. In this chapter, among the other items brought forward, we have outlined ... action in a prevention, detection, and responsive manner. REFERENCES. CAIDA. (2005). Analysis of Code Red. Retrieved ...
... actions that have been allowed. This involves specifying and implementing a security policy. Verton, D. (2003). Black ice: The invisible threat of cyber-terrorism (1st ed.). McGraw-Hill; Osborne Media. Yen, J. (2003, September) ...
... action. Relevancy of information existing in the system at the required point is paramount as the analysis of 9/11 shows (records of some of the terrorists activity did exist but were not implemented). The inherent tension between the ...
Содержание
1 | |
7 | |
17 | |
26 | |
Chapter V Infrastructures of Cyber Warfare | 35 |
Chapter VI Terrorism and the Internet | 42 |
Chapter VII Steganography | 50 |
Chapter VIII Cryptography | 57 |
Prevention Intrusion Detection and Mitigation | 262 |
Chapter XXXII LargeScale Monitoring of Critical Digital Infrastructures | 273 |
Chapter XXXIII Public Key Infrastructures as a Means for Increasing Network Security | 281 |
Chapter XXXIV Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism | 291 |
Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism | 298 |
Section V Identification Authorization and Access Control | 305 |
Chapter XXXVI Hacking and Eavesdropping | 307 |
Chapter XXXVII Access Control Models | 318 |
Chapter IX A Roadmap for Delivering Trustworthy IT Processes | 65 |
Section II Dynamic Aspects of Cyber Warfare and Cyber Terrorism | 76 |
Chapter X An Introduction to Key Themes in the Economics of Cyber Security | 78 |
Chapter XI Role of FSISAC in Countering Cyber Terrorism | 83 |
Chapter XII Deception in Cyber Attacks | 91 |
Chapter XIII Deception in Defense of Computer Systems from Cyber Attack | 97 |
Chapter XIV Ethics of Cyber War Attacks | 105 |
Approaches for Oversight | 112 |
Chapter XVI NetworkBased Passive Information Gathering | 120 |
Chapter XVII Electronic Money Management in Modern Online Businesses | 129 |
Chapter XVIII The Analysis of Money Laundering Techniques | 138 |
Chapter XIX Spam Spim and Illegal Advertisement | 146 |
Specialized Trojan Horse | 154 |
The Most Prevalent Technique for Attacking Web Powered Databases | 161 |
Section III Human Aspects of Cyber Warfare and Cyber Terrorism | 171 |
Chapter XXII Electronic Surveillance and Civil Rights | 173 |
Chapter XXIII Social Engineering | 182 |
Chapter XXIV Social Engineering | 191 |
Chapter XXV Behavioral Information Security | 199 |
Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection | 206 |
A Challenge for Web Security | 216 |
Section IV Technical Aspects of Handling Cyber Attacks | 226 |
Chapter XXVIII Cyber Security Models | 228 |
Systems Development with Integrated Security | 241 |
Chapter XXX Antispam Approaches Against Information Warfare | 254 |
Chapter XXXVIII An Overview of IDS Using Anomaly Detection | 327 |
A New Mode of Authentication Access Using Visual Evoked Potentials | 338 |
Chapter XL ContentBased Policy Specification for Multimedia Authorization and Access Control Model | 345 |
Chapter XLI Data Mining | 358 |
Chapter XLII Identification and Localization of Digital Addresses on the Internet | 366 |
Chapter XLIII Identification Through Data Mining | 374 |
Section VI Business Continuity | 381 |
Chapter XLIV A Model for Emergency Response Systems | 383 |
Chapter XLV Bouncing Techniques | 392 |
Chapter XLVI Cyber Forensics | 397 |
Chapter XLVII Software Component Survivability in Information Warfare | 403 |
Chapter XLVIII Taxonomy for Computer Security Incidents | 412 |
National and International Responses | 418 |
The European Response | 420 |
Chapter L EU Tackles Cybercrime | 431 |
Chapter LI The US Military Response to Cyber Warfare | 439 |
Chapter LII USAs View on World Cyber Security Issues | 446 |
Chapter LIII ECHELON and the NSA | 453 |
Chapter LIV International Cybercrime Convention | 469 |
Epilogue | 477 |
Glossary | 479 |
Compilation of References | 483 |
About the Editors | 528 |
Index | 529 |