Cyber Warfare and Cyber TerrorismJanczewski, Lech, Colarik, Andrew Idea Group Inc (IGI), 31 мая 2007 г. - Всего страниц: 564 Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks. |
Результаты поиска по книге
Результаты 1 – 5 из 63
... damages to information technology applications and their respective infrastructures. To counter this new discipline, information/computer security emerged. At present, the efforts of security specialists have started to pay off, and the ...
... damages (i.e., political, economic, and cultural) of 9/11 be created using information technology? Several studies indicate that in the early 1990s, the American society was not well prepared against electronic attacks. As a result ...
... damage of an attack, it should have a spectacular nature. By spectacular we consider attacks aimed at either creating huge direct losses and/or resulting in a lot of negative publicity. In 1999, the Amazon.com Web site was closed for ...
... damage a system with a virus, then he or she needs to consider how the virus will be delivered and what capabilities said virus is to be empowered with in order to create the damage done (i.e., delete data, monitor activities, steal ...
... damages worldwide when a university student in the Philippines developed and released the Love Bug virus. Now this is no small matter when it is considered that Hurricane Andrew caused US$25 billion in damage when it went through the ...
Содержание
1 | |
7 | |
17 | |
26 | |
Chapter V Infrastructures of Cyber Warfare | 35 |
Chapter VI Terrorism and the Internet | 42 |
Chapter VII Steganography | 50 |
Chapter VIII Cryptography | 57 |
Prevention Intrusion Detection and Mitigation | 262 |
Chapter XXXII LargeScale Monitoring of Critical Digital Infrastructures | 273 |
Chapter XXXIII Public Key Infrastructures as a Means for Increasing Network Security | 281 |
Chapter XXXIV Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism | 291 |
Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism | 298 |
Section V Identification Authorization and Access Control | 305 |
Chapter XXXVI Hacking and Eavesdropping | 307 |
Chapter XXXVII Access Control Models | 318 |
Chapter IX A Roadmap for Delivering Trustworthy IT Processes | 65 |
Section II Dynamic Aspects of Cyber Warfare and Cyber Terrorism | 76 |
Chapter X An Introduction to Key Themes in the Economics of Cyber Security | 78 |
Chapter XI Role of FSISAC in Countering Cyber Terrorism | 83 |
Chapter XII Deception in Cyber Attacks | 91 |
Chapter XIII Deception in Defense of Computer Systems from Cyber Attack | 97 |
Chapter XIV Ethics of Cyber War Attacks | 105 |
Approaches for Oversight | 112 |
Chapter XVI NetworkBased Passive Information Gathering | 120 |
Chapter XVII Electronic Money Management in Modern Online Businesses | 129 |
Chapter XVIII The Analysis of Money Laundering Techniques | 138 |
Chapter XIX Spam Spim and Illegal Advertisement | 146 |
Specialized Trojan Horse | 154 |
The Most Prevalent Technique for Attacking Web Powered Databases | 161 |
Section III Human Aspects of Cyber Warfare and Cyber Terrorism | 171 |
Chapter XXII Electronic Surveillance and Civil Rights | 173 |
Chapter XXIII Social Engineering | 182 |
Chapter XXIV Social Engineering | 191 |
Chapter XXV Behavioral Information Security | 199 |
Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection | 206 |
A Challenge for Web Security | 216 |
Section IV Technical Aspects of Handling Cyber Attacks | 226 |
Chapter XXVIII Cyber Security Models | 228 |
Systems Development with Integrated Security | 241 |
Chapter XXX Antispam Approaches Against Information Warfare | 254 |
Chapter XXXVIII An Overview of IDS Using Anomaly Detection | 327 |
A New Mode of Authentication Access Using Visual Evoked Potentials | 338 |
Chapter XL ContentBased Policy Specification for Multimedia Authorization and Access Control Model | 345 |
Chapter XLI Data Mining | 358 |
Chapter XLII Identification and Localization of Digital Addresses on the Internet | 366 |
Chapter XLIII Identification Through Data Mining | 374 |
Section VI Business Continuity | 381 |
Chapter XLIV A Model for Emergency Response Systems | 383 |
Chapter XLV Bouncing Techniques | 392 |
Chapter XLVI Cyber Forensics | 397 |
Chapter XLVII Software Component Survivability in Information Warfare | 403 |
Chapter XLVIII Taxonomy for Computer Security Incidents | 412 |
National and International Responses | 418 |
The European Response | 420 |
Chapter L EU Tackles Cybercrime | 431 |
Chapter LI The US Military Response to Cyber Warfare | 439 |
Chapter LII USAs View on World Cyber Security Issues | 446 |
Chapter LIII ECHELON and the NSA | 453 |
Chapter LIV International Cybercrime Convention | 469 |
Epilogue | 477 |
Glossary | 479 |
Compilation of References | 483 |
About the Editors | 528 |
Index | 529 |