Cyber Warfare and Cyber TerrorismJanczewski, Lech, Colarik, Andrew Idea Group Inc (IGI), 31 мая 2007 г. - Всего страниц: 564 Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks. |
Результаты поиска по книге
Результаты 1 – 5 из 83
... inherent strengths (i.e., communication and coordination of global activities, and intelligence gathering) and vulnerabilities (i.e., protocol weaknesses and people processes) xi can be considered one of the primary sources of.
... activities affecting a nation were discussed, followed by a discussion of the potential outcomes of such attacks and methods to limit the likelihood of such events. We will use the term cyber terrorism as: Cyber terrorism means ...
... activities do not always end up with huge financial losses. Some of the most effective ways to demonstrate an organization's vulnerability is to cause a denial of service to the commercial server or something as simple as the defacement ...
... activities. Intruders may also seek to change important data in an attempt to either cover their tracks (i.e., such as delete/modify an audit log) or to cause people or other processes to act on the changed data in a way that causes a ...
... activities of an initial attack (i.e., transitive capabilities), and facilitate the spread of additional malicious code. Care must be taken in the selection and configuration of these types of software, as well as the source ...
Содержание
1 | |
7 | |
17 | |
26 | |
Chapter V Infrastructures of Cyber Warfare | 35 |
Chapter VI Terrorism and the Internet | 42 |
Chapter VII Steganography | 50 |
Chapter VIII Cryptography | 57 |
Prevention Intrusion Detection and Mitigation | 262 |
Chapter XXXII LargeScale Monitoring of Critical Digital Infrastructures | 273 |
Chapter XXXIII Public Key Infrastructures as a Means for Increasing Network Security | 281 |
Chapter XXXIV Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism | 291 |
Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism | 298 |
Section V Identification Authorization and Access Control | 305 |
Chapter XXXVI Hacking and Eavesdropping | 307 |
Chapter XXXVII Access Control Models | 318 |
Chapter IX A Roadmap for Delivering Trustworthy IT Processes | 65 |
Section II Dynamic Aspects of Cyber Warfare and Cyber Terrorism | 76 |
Chapter X An Introduction to Key Themes in the Economics of Cyber Security | 78 |
Chapter XI Role of FSISAC in Countering Cyber Terrorism | 83 |
Chapter XII Deception in Cyber Attacks | 91 |
Chapter XIII Deception in Defense of Computer Systems from Cyber Attack | 97 |
Chapter XIV Ethics of Cyber War Attacks | 105 |
Approaches for Oversight | 112 |
Chapter XVI NetworkBased Passive Information Gathering | 120 |
Chapter XVII Electronic Money Management in Modern Online Businesses | 129 |
Chapter XVIII The Analysis of Money Laundering Techniques | 138 |
Chapter XIX Spam Spim and Illegal Advertisement | 146 |
Specialized Trojan Horse | 154 |
The Most Prevalent Technique for Attacking Web Powered Databases | 161 |
Section III Human Aspects of Cyber Warfare and Cyber Terrorism | 171 |
Chapter XXII Electronic Surveillance and Civil Rights | 173 |
Chapter XXIII Social Engineering | 182 |
Chapter XXIV Social Engineering | 191 |
Chapter XXV Behavioral Information Security | 199 |
Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection | 206 |
A Challenge for Web Security | 216 |
Section IV Technical Aspects of Handling Cyber Attacks | 226 |
Chapter XXVIII Cyber Security Models | 228 |
Systems Development with Integrated Security | 241 |
Chapter XXX Antispam Approaches Against Information Warfare | 254 |
Chapter XXXVIII An Overview of IDS Using Anomaly Detection | 327 |
A New Mode of Authentication Access Using Visual Evoked Potentials | 338 |
Chapter XL ContentBased Policy Specification for Multimedia Authorization and Access Control Model | 345 |
Chapter XLI Data Mining | 358 |
Chapter XLII Identification and Localization of Digital Addresses on the Internet | 366 |
Chapter XLIII Identification Through Data Mining | 374 |
Section VI Business Continuity | 381 |
Chapter XLIV A Model for Emergency Response Systems | 383 |
Chapter XLV Bouncing Techniques | 392 |
Chapter XLVI Cyber Forensics | 397 |
Chapter XLVII Software Component Survivability in Information Warfare | 403 |
Chapter XLVIII Taxonomy for Computer Security Incidents | 412 |
National and International Responses | 418 |
The European Response | 420 |
Chapter L EU Tackles Cybercrime | 431 |
Chapter LI The US Military Response to Cyber Warfare | 439 |
Chapter LII USAs View on World Cyber Security Issues | 446 |
Chapter LIII ECHELON and the NSA | 453 |
Chapter LIV International Cybercrime Convention | 469 |
Epilogue | 477 |
Glossary | 479 |
Compilation of References | 483 |
About the Editors | 528 |
Index | 529 |