Front cover image for Cyber warfare and cyber terrorism

Cyber warfare and cyber terrorism

Lech Janczewski (Editor), Andrew M. Colarik (Editor)
"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher
eBook, English, 2008
Information Science Reference, Hershey, 2008
1 online resource (xxx, 564 pages) : illustrations
9781591409922, 9781591409915, 9781280919329, 1591409926, 1591409918, 1280919329
166150898
Introductory chapter / Andrew M. Colarik and Lech J. Janczewski
Section 1. Terms, concepts, and definitions
Cyber terrorism attacks / Kevin Curran, Kevin Concannon, and Sean McKeever
Knowledge management, terrorism, and cyber terrorism / Gil Ariely
Ten information warfare trends / Kenneth J. Knapp and William R. Boulton
Bits and bytes vs. bullets and bombs : a new form of warfare / John H. Nugent and Mahesh Raisinghani
Infrastructures of cyber warfare / Robert S. Owen
Terrorism and the Internet / M.J. Warren
Steganography / Merrill Warkentin, Mark B. Schmidt, and Ernst Bekkering
Cryptography / Kevin Curran, Niall Smyth, and Bryan McGrory
A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, and Ibrahim Al Kattan
Section 2. Dynamic aspects of cyber warfare and cyber terrorism
An introduction to key themes in the economics of cyber security / Neil Gandal
Role of FS-ISAC in countering cyber terrorism / Manish Gupta and H.R. Rao
Deception in cyber attacks / Neil C. Rowe and E. John Custy
Deception in defense of computer systems from cyber attack / Neil C. Rowe
Ethics of cyber war attacks / Neil C. Rowe
International outsourcing, personal data, and cyber terrorism : approaches for oversight / Kirk St. Amant
Network-based passive information gathering / Romuald Thion
Electronic money management in modern online business / Theodoros Tzouramanis
The analysis of money laundering techniques / Krzysztof Woda
Spam, spin, and illegal advertisement / Dionysios V. Politis and Konstantinos P. Theodoridis
Malware : specialized Trojan horse / Stefan Kiltz, Andreas Lang, and Jana Dittmann
SQL code poisoning : the most prevalent technique for attacking web powered databases / Theodoros Tzouramanis
Section 3. Human aspects of cyber warfare and cyber terrorism
Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meena, and Ciaran Heaney
Social engineering / B. Bhagyavati
Social engineering / Michael Aiello
Behavioral information security / Isabelle J. Fagnot
Toward a deeper understanding of personnel anomaly detection / Shuyuan Mary Ho
Cyber stalking : a challenge for web security / Alok Mishra and Deepti Mishra
Section 4. Technical aspects of handling cyber attacks
Cyber security models / Norman F. Schneidewind
Cyber war defense : systems development with integrated security / Murray E. Jennex
Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, and Joon S. Park
Denial-of-service (DoS) attacks : prevention, intrusion detection, and mitigation / Georg Disterer, Ame Alles, and Axel Hervatin
Large-scale monitoring of critical digital infrastructures / André Årnes
Public key infrastructures as a means for increasing network security / Ioannis P. Chochliouros [and others]
Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark R. Leipnik
Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong and Mark R. Leipnik
Section 5. Identification, authorization, and access control
Hacking and eavesdropping / Kevin Curran [and others]
Access control models / Romuald Thion
An overview of IDS using anomaly detection / Lior Rokach and Yuval Elovici
Bio-cyber machine gun : a new mode of authentication access using visual evoked potentials / Andrews Samraj
Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna and Richard Chbeir
Data mining / Mark Last
Identification and localization of digital addresses on the Internet / André Ånes
Identification through data mining / Diego Liberati
Section 6. Business continuity
A model for emergency response systems / Murray E. Jennex
Bouncing techniques / Stéphane Coulondre
Cyber forensics / Stéphane Coulondre
Software component survivability in information warfare / Joon S. Park and Joseph Giordano
Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, and Jana Dittmann
Section 7. Cyber warfare and cyber terrorism : national and international responses
Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism : the European response / Ioannis P. Chochliouros, Anastasia S. Spiliopoulou, and Stergios P. Chochliouros
EU tackles cybercrime / Sylvia Mercado Kierkegaard
The U.S. military response to cyber warfare / Richard J. Kilroy, Jr
USA's view on world cyber security issues / Norman Schneidewind
ECHELON and the NSA / D.C. Webb
International Cybercrime Convention / Sylvia Mercado-Kierkegaard
Text in English
services.igi-global.com Access restricted to McGill users
galenet.galegroup.com Available for Scott Community College via Gale Virtual Reference Library. Click here to access
galenet.galegroup.com Available for Clinton Community College via Gale Virtual Reference Library. Click here to access
galenet.galegroup.com Available for Muscatine Community College via Gale Virtual Reference Library. Click here to access
go.galegroup.com Gale Reference