Cyber Warfare and Cyber TerrorismJanczewski, Lech, Colarik, Andrew Idea Group Inc (IGI), 31 мая 2007 г. - Всего страниц: 564 Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks. |
Результаты поиска по книге
Результаты 1 – 5 из 62
... distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the ...
... distributed structures internationally to expand global reach, as well as outsourcing services requiring the use of information to less expensive centers around the world. This has created an extended communication structure between ...
... distribute itself and then damage the host computer system. This is but one application of what a virus can do with this portal. Such viruses now are being used to inundate targeted installations (i.e. military, government, corporate ...
... distributed denial-of-service attacks: A proposal. Proceedings of the IEEE, 92(9). Dotti, P., & Rees, O. (1999, June). Protecting the hosted application server. Proceedings of the IEEE 8th International Workshops on Enabling ...
... Distributed Computer Systems Workshops. Wan, K., & Chang, R. (2002). Engineering of a global defense infrastructure for DDOS attacks. Proceedings of the 10th IEEE International Conference on Networks. Weaver, N., Paxson, V., Staniford ...
Содержание
1 | |
7 | |
17 | |
26 | |
Chapter V Infrastructures of Cyber Warfare | 35 |
Chapter VI Terrorism and the Internet | 42 |
Chapter VII Steganography | 50 |
Chapter VIII Cryptography | 57 |
Prevention Intrusion Detection and Mitigation | 262 |
Chapter XXXII LargeScale Monitoring of Critical Digital Infrastructures | 273 |
Chapter XXXIII Public Key Infrastructures as a Means for Increasing Network Security | 281 |
Chapter XXXIV Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism | 291 |
Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism | 298 |
Section V Identification Authorization and Access Control | 305 |
Chapter XXXVI Hacking and Eavesdropping | 307 |
Chapter XXXVII Access Control Models | 318 |
Chapter IX A Roadmap for Delivering Trustworthy IT Processes | 65 |
Section II Dynamic Aspects of Cyber Warfare and Cyber Terrorism | 76 |
Chapter X An Introduction to Key Themes in the Economics of Cyber Security | 78 |
Chapter XI Role of FSISAC in Countering Cyber Terrorism | 83 |
Chapter XII Deception in Cyber Attacks | 91 |
Chapter XIII Deception in Defense of Computer Systems from Cyber Attack | 97 |
Chapter XIV Ethics of Cyber War Attacks | 105 |
Approaches for Oversight | 112 |
Chapter XVI NetworkBased Passive Information Gathering | 120 |
Chapter XVII Electronic Money Management in Modern Online Businesses | 129 |
Chapter XVIII The Analysis of Money Laundering Techniques | 138 |
Chapter XIX Spam Spim and Illegal Advertisement | 146 |
Specialized Trojan Horse | 154 |
The Most Prevalent Technique for Attacking Web Powered Databases | 161 |
Section III Human Aspects of Cyber Warfare and Cyber Terrorism | 171 |
Chapter XXII Electronic Surveillance and Civil Rights | 173 |
Chapter XXIII Social Engineering | 182 |
Chapter XXIV Social Engineering | 191 |
Chapter XXV Behavioral Information Security | 199 |
Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection | 206 |
A Challenge for Web Security | 216 |
Section IV Technical Aspects of Handling Cyber Attacks | 226 |
Chapter XXVIII Cyber Security Models | 228 |
Systems Development with Integrated Security | 241 |
Chapter XXX Antispam Approaches Against Information Warfare | 254 |
Chapter XXXVIII An Overview of IDS Using Anomaly Detection | 327 |
A New Mode of Authentication Access Using Visual Evoked Potentials | 338 |
Chapter XL ContentBased Policy Specification for Multimedia Authorization and Access Control Model | 345 |
Chapter XLI Data Mining | 358 |
Chapter XLII Identification and Localization of Digital Addresses on the Internet | 366 |
Chapter XLIII Identification Through Data Mining | 374 |
Section VI Business Continuity | 381 |
Chapter XLIV A Model for Emergency Response Systems | 383 |
Chapter XLV Bouncing Techniques | 392 |
Chapter XLVI Cyber Forensics | 397 |
Chapter XLVII Software Component Survivability in Information Warfare | 403 |
Chapter XLVIII Taxonomy for Computer Security Incidents | 412 |
National and International Responses | 418 |
The European Response | 420 |
Chapter L EU Tackles Cybercrime | 431 |
Chapter LI The US Military Response to Cyber Warfare | 439 |
Chapter LII USAs View on World Cyber Security Issues | 446 |
Chapter LIII ECHELON and the NSA | 453 |
Chapter LIV International Cybercrime Convention | 469 |
Epilogue | 477 |
Glossary | 479 |
Compilation of References | 483 |
About the Editors | 528 |
Index | 529 |