Cyber Warfare and Cyber Terrorism

Передняя обложка
Janczewski, Lech, Colarik, Andrew
Idea Group Inc (IGI), 31 мая 2007 г. - Всего страниц: 564

Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field.

Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.

Результаты поиска по книге

Избранные страницы

Содержание

Chapter I Cyber Terrorism Attacks
1
Chapter II Knowledge Management Terrorism and Cyber Terrorism
7
Chapter III Ten Information Warfare Trends
17
A New Form of Warfare
26
Chapter V Infrastructures of Cyber Warfare
35
Chapter VI Terrorism and the Internet
42
Chapter VII Steganography
50
Chapter VIII Cryptography
57
Prevention Intrusion Detection and Mitigation
262
Chapter XXXII LargeScale Monitoring of Critical Digital Infrastructures
273
Chapter XXXIII Public Key Infrastructures as a Means for Increasing Network Security
281
Chapter XXXIV Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism
291
Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism
298
Section V Identification Authorization and Access Control
305
Chapter XXXVI Hacking and Eavesdropping
307
Chapter XXXVII Access Control Models
318

Chapter IX A Roadmap for Delivering Trustworthy IT Processes
65
Section II Dynamic Aspects of Cyber Warfare and Cyber Terrorism
76
Chapter X An Introduction to Key Themes in the Economics of Cyber Security
78
Chapter XI Role of FSISAC in Countering Cyber Terrorism
83
Chapter XII Deception in Cyber Attacks
91
Chapter XIII Deception in Defense of Computer Systems from Cyber Attack
97
Chapter XIV Ethics of Cyber War Attacks
105
Approaches for Oversight
112
Chapter XVI NetworkBased Passive Information Gathering
120
Chapter XVII Electronic Money Management in Modern Online Businesses
129
Chapter XVIII The Analysis of Money Laundering Techniques
138
Chapter XIX Spam Spim and Illegal Advertisement
146
Specialized Trojan Horse
154
The Most Prevalent Technique for Attacking Web Powered Databases
161
Section III Human Aspects of Cyber Warfare and Cyber Terrorism
171
Chapter XXII Electronic Surveillance and Civil Rights
173
Chapter XXIII Social Engineering
182
Chapter XXIV Social Engineering
191
Chapter XXV Behavioral Information Security
199
Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection
206
A Challenge for Web Security
216
Section IV Technical Aspects of Handling Cyber Attacks
226
Chapter XXVIII Cyber Security Models
228
Systems Development with Integrated Security
241
Chapter XXX Antispam Approaches Against Information Warfare
254
Chapter XXXVIII An Overview of IDS Using Anomaly Detection
327
A New Mode of Authentication Access Using Visual Evoked Potentials
338
Chapter XL ContentBased Policy Specification for Multimedia Authorization and Access Control Model
345
Chapter XLI Data Mining
358
Chapter XLII Identification and Localization of Digital Addresses on the Internet
366
Chapter XLIII Identification Through Data Mining
374
Section VI Business Continuity
381
Chapter XLIV A Model for Emergency Response Systems
383
Chapter XLV Bouncing Techniques
392
Chapter XLVI Cyber Forensics
397
Chapter XLVII Software Component Survivability in Information Warfare
403
Chapter XLVIII Taxonomy for Computer Security Incidents
412
National and International Responses
418
The European Response
420
Chapter L EU Tackles Cybercrime
431
Chapter LI The US Military Response to Cyber Warfare
439
Chapter LII USAs View on World Cyber Security Issues
446
Chapter LIII ECHELON and the NSA
453
Chapter LIV International Cybercrime Convention
469
Epilogue
477
Glossary
479
Compilation of References
483
About the Editors
528
Index
529
Авторские права

Другие издания - Просмотреть все

Часто встречающиеся слова и выражения

Об авторе (2007)

Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP?s Technical Committee on Security and Protection in Information Processing Systems (TC-11).

Andrew Colarik has accumulated over twenty five years experience of knowledge utilizing computer information systems. This includes systems analysis and design, network administration, university level teaching, and the justification, specification, and implementation of factory and office automation. He is the holder of a Ph. D. in Information Systems from the University of Auckland, and a Masters of Business Administration from Kent State University. As a researcher, author, and inventor, Dr. Colarik has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents. [Editor]

Библиографические данные