Cyber terrorism: political and economic implications
"This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hershey, PA [u.a.]
Idea Group Publ.
2006
|
Schlagworte: | |
Online-Zugang: | Table of contents Inhaltsverzeichnis |
Zusammenfassung: | "This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher. |
Beschreibung: | "This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher. Includes bibliographical references and index |
Beschreibung: | XVII, 172 S. Ill. |
ISBN: | 1599040212 1599040220 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021564379 | ||
003 | DE-604 | ||
005 | 20060802 | ||
007 | t | ||
008 | 060428s2006 xxua||| |||| 00||| eng d | ||
010 | |a 2005034831 | ||
020 | |a 1599040212 |c hardcover |9 1-59904-021-2 | ||
020 | |a 1599040220 |c soft cover |9 1-59904-022-0 | ||
035 | |a (OCoLC)62421204 | ||
035 | |a (DE-599)BVBBV021564379 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-20 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 363.325 |2 22 | |
100 | 1 | |a Colarik, Andrew M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber terrorism |b political and economic implications |c Andrew Michael Colarik |
246 | 1 | 3 | |a Cyberterrorism |
264 | 1 | |a Hershey, PA [u.a.] |b Idea Group Publ. |c 2006 | |
300 | |a XVII, 172 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher. | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a "This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher. | |
650 | 4 | |a Politik | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Information superhighway |x Economic aspects | |
650 | 4 | |a Information warfare |x Political aspects | |
650 | 4 | |a Asymmetric warfare | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 1 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 1 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 1-59904-023-9 |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip064/2005034831.html |3 Table of contents | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014780276&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014780276 |
Datensatz im Suchindex
_version_ | 1804135327388925952 |
---|---|
adam_text | Cyber Terrorism:
Political and Economic
Implications
Table of Contents
Foreword viii
Preface xi
Chapterl
Introduction 1
Objectives ofThis Chapter 1
Terrorist Atrocities 2
State Sponsors of Terror 3
Frequency ofAttacks 5
The Role of Information and Technology 7
Network Approachby Terrorist Groups 8
Main Issue and Problem: The Global Information Infrastructure.. 9
Organization ofThis Book 11
Final Thoughts ofThis Chapter 11
Chapterll
The Power of Terrorism 14
Objectives ofThis Chapter 14
What is Terrorism? 15
Domestic 18
Intimidation 19
Political Strife 20
Economic Consequences 22
Global 23
Media Empowerment 23
MinoritySolidarity 24
Extremist Subgroups 25
SubgroupConfederation 26
Final Thoughts ofThis Chapter 28
ChapterUI
Cyber Terrorism Evolution 33
Objectives ofThis Chapter 33
Introduction 34
Bits and Chips 36
Hacking and Hacktivism 37
Crackers and Cracking 40
Cyber Criminals and Cyber Crime 42
Cyber Terrorism and Cyber Terrorists 45
Communication, Coordination and Information Sharing 48
ActivityDissemination 50
Cyber Terrorist Tasks 51
Final Thoughts of This Chapter 52
Chapter IV
Global Information Infrastructure 58
Objectives ofThis Chapter 58
Introduction 59
Telephone System 61
Landlines 62
Mobüe 63
Cable 64
Satellites 65
Internet 68
Security Services 69
Authentication 70
Access Control 70
Data Integrity and Confidentiality 71
Nonrepudiation 71
Auditing 72
MechanismsandProtocols 72
Final Thoughts ofThis Chapter 76
ChapterV
Current Cyber AttackMethods 82
Objectives ofThis Chapter 82
Introduction 83
Infernal Penetration 85
UsagePortals 86
Deliverables 91
External Penetration 94
Social Engineering 94
Physical 95
WirelessCommunicationMedium 96
User Access Points 97
Firewalls 99
Web Sites and Servers 100
Routers and Gateways 103
DomainName Servers 104
AuditLogs 106
Final Thoughts ofThis Chapter 107
Chapter VI
AttackScenarios 111
Objectives ofThis Chapter 111
Introduction 112
Target Intelligence 112
Histories 113
Physical Layout 114
Emergency Plans 115
Schedules 116
KeyPersonnel 116
Electronic Attack Targets 118
Public and Private Utilities 120
Banking and Finance 124
Transportation 128
Medical 131
Education 132
Government 135
Precursor to a Physical Attack 137
Final Thoughts ofThis Chapter 139
ChapterVII
ThoughtsfortheFuture 147
Objectives ofThis Chapter 147
Introduction 148
KeylssuestoBeConsidered 150
Proposed Solutions 154
InformationasaPropertyRight 155
Global Information Security Center 156
Alter SoftwareLicensure Agreements 157
CreationofanUnderwritersLaboratoryof Security Products .158
LawEnforcement Tiger Teams 160
CreatetheLeagueof Cyber Communities 161
EliminationoftheOpenHandshakeProtocol 161
Final Thoughts 162
AbouttheAuthor 166
Index 168
|
adam_txt |
Cyber Terrorism:
Political and Economic
Implications
Table of Contents
Foreword viii
Preface xi
Chapterl
Introduction 1
Objectives ofThis Chapter 1
Terrorist Atrocities 2
State Sponsors of Terror 3
Frequency ofAttacks 5
The Role of Information and Technology 7
Network Approachby Terrorist Groups 8
Main Issue and Problem: The Global Information Infrastructure. 9
Organization ofThis Book 11
Final Thoughts ofThis Chapter 11
Chapterll
The Power of Terrorism 14
Objectives ofThis Chapter 14
What is Terrorism? 15
Domestic 18
Intimidation 19
Political Strife 20
Economic Consequences 22
Global 23
Media Empowerment 23
MinoritySolidarity 24
Extremist Subgroups 25
SubgroupConfederation 26
Final Thoughts ofThis Chapter 28
ChapterUI
Cyber Terrorism Evolution 33
Objectives ofThis Chapter 33
Introduction 34
Bits and Chips 36
Hacking and Hacktivism 37
Crackers and Cracking 40
Cyber Criminals and Cyber Crime 42
Cyber Terrorism and Cyber Terrorists 45
Communication, Coordination and Information Sharing 48
ActivityDissemination 50
Cyber Terrorist Tasks 51
Final Thoughts of This Chapter 52
Chapter IV
Global Information Infrastructure 58
Objectives ofThis Chapter 58
Introduction 59
Telephone System 61
Landlines 62
Mobüe 63
Cable 64
Satellites 65
Internet 68
Security Services 69
Authentication 70
Access Control 70
Data Integrity and Confidentiality 71
Nonrepudiation 71
Auditing 72
MechanismsandProtocols 72
Final Thoughts ofThis Chapter 76
ChapterV
Current Cyber AttackMethods 82
Objectives ofThis Chapter 82
Introduction 83
Infernal Penetration 85
UsagePortals 86
Deliverables 91
External Penetration 94
Social Engineering 94
Physical 95
WirelessCommunicationMedium 96
User Access Points 97
Firewalls 99
Web Sites and Servers 100
Routers and Gateways 103
DomainName Servers 104
AuditLogs 106
Final Thoughts ofThis Chapter 107
Chapter VI
AttackScenarios 111
Objectives ofThis Chapter 111
Introduction 112
Target Intelligence 112
Histories 113
Physical Layout 114
Emergency Plans 115
Schedules 116
KeyPersonnel 116
Electronic Attack Targets 118
Public and Private Utilities 120
Banking and Finance 124
Transportation 128
Medical 131
Education 132
Government 135
Precursor to a Physical Attack 137
Final Thoughts ofThis Chapter 139
ChapterVII
ThoughtsfortheFuture 147
Objectives ofThis Chapter 147
Introduction 148
KeylssuestoBeConsidered 150
Proposed Solutions 154
InformationasaPropertyRight 155
Global Information Security Center 156
Alter SoftwareLicensure Agreements 157
CreationofanUnderwritersLaboratoryof Security Products .158
LawEnforcement Tiger Teams 160
CreatetheLeagueof Cyber Communities 161
EliminationoftheOpenHandshakeProtocol 161
Final Thoughts 162
AbouttheAuthor 166
Index 168 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Colarik, Andrew M. |
author_facet | Colarik, Andrew M. |
author_role | aut |
author_sort | Colarik, Andrew M. |
author_variant | a m c am amc |
building | Verbundindex |
bvnumber | BV021564379 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)62421204 (DE-599)BVBBV021564379 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
discipline_str_mv | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02430nam a2200577zc 4500</leader><controlfield tag="001">BV021564379</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060802 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060428s2006 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005034831</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1599040212</subfield><subfield code="c">hardcover</subfield><subfield code="9">1-59904-021-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1599040220</subfield><subfield code="c">soft cover</subfield><subfield code="9">1-59904-022-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62421204</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021564379</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-20</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Colarik, Andrew M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber terrorism</subfield><subfield code="b">political and economic implications</subfield><subfield code="c">Andrew Michael Colarik</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA [u.a.]</subfield><subfield code="b">Idea Group Publ.</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 172 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information superhighway</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Asymmetric warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">1-59904-023-9</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip064/2005034831.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014780276&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014780276</subfield></datafield></record></collection> |
id | DE-604.BV021564379 |
illustrated | Illustrated |
index_date | 2024-07-02T14:35:54Z |
indexdate | 2024-07-09T20:38:45Z |
institution | BVB |
isbn | 1599040212 1599040220 |
language | English |
lccn | 2005034831 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014780276 |
oclc_num | 62421204 |
open_access_boolean | |
owner | DE-12 DE-20 |
owner_facet | DE-12 DE-20 |
physical | XVII, 172 S. Ill. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Idea Group Publ. |
record_format | marc |
spelling | Colarik, Andrew M. Verfasser aut Cyber terrorism political and economic implications Andrew Michael Colarik Cyberterrorism Hershey, PA [u.a.] Idea Group Publ. 2006 XVII, 172 S. Ill. txt rdacontent n rdamedia nc rdacarrier "This book is a brief that outlines many of the recent terrorist activities, political objectives, and their use of cyber space"--Provided by publisher. Includes bibliographical references and index Politik Computer crimes Information superhighway Economic aspects Information warfare Political aspects Asymmetric warfare Computer networks Security measures Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Cyberspace (DE-588)4266146-8 s Terrorismus (DE-588)4059534-1 s DE-604 Computerkriminalität (DE-588)4010452-7 s Erscheint auch als Online-Ausgabe 1-59904-023-9 http://www.loc.gov/catdir/toc/ecip064/2005034831.html Table of contents HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014780276&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Colarik, Andrew M. Cyber terrorism political and economic implications Politik Cyberterrorism Computer crimes Information superhighway Economic aspects Information warfare Political aspects Asymmetric warfare Computer networks Security measures Computerkriminalität (DE-588)4010452-7 gnd Terrorismus (DE-588)4059534-1 gnd Cyberspace (DE-588)4266146-8 gnd |
subject_GND | (DE-588)4010452-7 (DE-588)4059534-1 (DE-588)4266146-8 |
title | Cyber terrorism political and economic implications |
title_alt | Cyberterrorism |
title_auth | Cyber terrorism political and economic implications |
title_exact_search | Cyber terrorism political and economic implications |
title_exact_search_txtP | Cyber terrorism political and economic implications |
title_full | Cyber terrorism political and economic implications Andrew Michael Colarik |
title_fullStr | Cyber terrorism political and economic implications Andrew Michael Colarik |
title_full_unstemmed | Cyber terrorism political and economic implications Andrew Michael Colarik |
title_short | Cyber terrorism |
title_sort | cyber terrorism political and economic implications |
title_sub | political and economic implications |
topic | Politik Cyberterrorism Computer crimes Information superhighway Economic aspects Information warfare Political aspects Asymmetric warfare Computer networks Security measures Computerkriminalität (DE-588)4010452-7 gnd Terrorismus (DE-588)4059534-1 gnd Cyberspace (DE-588)4266146-8 gnd |
topic_facet | Politik Cyberterrorism Computer crimes Information superhighway Economic aspects Information warfare Political aspects Asymmetric warfare Computer networks Security measures Computerkriminalität Terrorismus Cyberspace |
url | http://www.loc.gov/catdir/toc/ecip064/2005034831.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014780276&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT colarikandrewm cyberterrorismpoliticalandeconomicimplications AT colarikandrewm cyberterrorism |