Introduction to cyber-warfare: a multidisciplinary approach
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Syngress Publ. [u.a.]
2013
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XVII, 318 S. Ill., graph. Darst. |
ISBN: | 9780124078147 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV041192207 | ||
003 | DE-604 | ||
005 | 20130909 | ||
007 | t | ||
008 | 130729s2013 ne ad|| |||| 00||| eng d | ||
010 | |a 2013014772 | ||
020 | |a 9780124078147 |c alk. paper |9 978-0-12407-814-7 | ||
035 | |a (OCoLC)859374725 | ||
035 | |a (DE-599)BVBBV041192207 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a ne |c NL | ||
049 | |a DE-12 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 355.4 | |
084 | |a 8 |2 ssgn | ||
100 | 1 | |a Shakarian, Paulo |e Verfasser |4 aut | |
245 | 1 | 0 | |a Introduction to cyber-warfare |b a multidisciplinary approach |c Paulo Shakarian ; Jana Shakarian ; Andrew Ruef |
264 | 1 | |a Boston [u.a.] |b Syngress Publ. [u.a.] |c 2013 | |
300 | |a XVII, 318 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Information warfare |v Case studies | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
653 | |a information assurance |a attribution | ||
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shakarian, Jana |e Verfasser |4 aut | |
700 | 1 | |a Ruef, Andrew |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen 4 |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026167253&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026167253 | ||
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090511 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 090512 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 090511 |
Datensatz im Suchindex
_version_ | 1804150613840232448 |
---|---|
adam_text | Contents
Preface
ix
Foreword
xi
Introduction
xiii
Biography
xvii
1.
Cyber Warfare: Here and Now
What Is Cyber War?
2
Is Cyber War a Credible Threat?
2
Attribution, Deception, and Intelligence
4
Information Assurance
6
__________
I
_________
CYBER ATTACK
2.
Political Cyber Attack Comes
of Age in
2007
Reliance on Information as a Vulnerability
12
Rudimentary but Effective: Denial of Service
12
Leaving Unwanted Messages: Web Site
Defacement
14
Tools for Denial of Service
14
The Difficulty of Assigning Blame: Why
Attribution Is Tough in a DDoS Attack
15
Estonia Is Hit by Cyber Attacks
16
General Response to DDoS
20
Summary
21
Suggested Further Reading
21
3.
How Cyber Attacks Augmented
Russian Military Operations
The
2008
Russian Cyber Campaign Against
Georgia
24
What Is Interesting About the Russian Cyber
Campaign
26
Preparing for
a Cyber-Capable
Adversary
29
Summary
31
Suggested Further Reading
31
4.
When Who Tells the Best
Story Wins: Cyber and
Information Operations in
the Middle East
Hijacking Noncombatant Civilian IP Addresses
to Help the War Effort: The Israel-Hezbollah
July War of
2006 34
Civilians in the Cyber Melee: Operation
Cast Lead
38
Summary
41
Suggested Further Reading
41
5.
Limiting Free Speech
on the Internet: Cyber
Attack Against Internal
Dissidents in Iran and Russia
DDoS as a Censorship Tool: Why Dissident Groups
Are Inherently Vulnerable to Cyber Attacks
44
Silencing Novaya
Gazeta
and Other Russian
Dissidents
47
Iran
—
How the
2009
Elections Led to Aggressive
Cyber Operations
53
Summary
61
6.
Cyber Attacks by
Nonstate
Hacking Groups: The Case
of Anonymous and Its Affiliates
Chaotic Beginnings: The Chaos Computer
Club,
CCC
69
The Roots of the Anon
—
4chan, 7chan, and
Other Message Boards
71
How We Are Influenced by 4chan:
Mêmes
72
VI
CONTENTS
Anonymous
—
On Image, Structure, and
Motivation
74
Anonymous
—
External Connections and
Spin
Offs 79
Your Security Is a Joke: LulzSec
82
Anonymous Modus
Operandi
85
Targeting Governments, Corporations, and
Individuals: Notable Hacks on Anonymous
87
Software for the Legion: Anonymous Products
93
Summary
95
Suggested Further Reading
96
_______
π
_______
CYBER ESPIONAGE AND
EXPLOITATION
7.
Enter the Dragon: Why Cyber Espionage
Against Militaries, Dissidents, and
Nondefense Corporations Is a Key
Component of Chinese Cyber Strategy
Introduction
114
Why Cyber Espionage Is Important to China: A Look
at Chinese Cyber Doctrine
116
Leveraging Resources Beyond the Military: The Cyber
Warriors of China
120
Stealing Information from the U.S. Industrial-Military
Complex: Titan Rain
124
Cyber War Against the Corporate World: A Case
Study of Cyber Intrusion Attributed to
China
128
Monitoring Dissidents: GhOstNet
132
Using Legitimate Web Sites for Data Exfiltration: The
Shadow Network
141
Cyber War Through Intellectual Property Theft:
Operation Aurora
145
An Example of the Current State of the Art:
Sykipot
150
Summary
152
Suggested Further Reading
153
8.
Duqu, Flame, Gauss, the Next
Generation of Cyber Exploitation
Introduction
160
Kernel Mode Rootkits
161
Vulnerabilities in the Operating System
162
Stolen Keying Material
163
Commonalities Between Stuxnet and Duqu
164
Information-Stealing Trojans
164
The Geography of Duqu
165
TDL3 and Other
Malware 166
Object-Oriented
Malware: Stuxnet,
Duqu, Flame, and
Gauss
166
Summary
169
Suggested Further Reading
169
9.
Losing Trust in Your Friends: Social
Network Exploitation
Introduction
172
Do You Really Know All Your Linkedln Connections
ľ
Imposters
in Social Networks
172
Designing Common Knowledge: Influencing a Social
Network
177
Summary
181
Suggested Further Reading
181
10.
How Iraqi Insurgents Watched
U.S. Predator Video
—
Information
Theft on the Tactical Battlefield
Introduction
186
The Predator UAV
186
Hacking the Predator Feed
187
Summary
194
Suggested Further Reading
194
________
in
________
CYBER OPERATIONS FOR
INFRASTRUCTURE ATTACK
11.
Cyber Warfare Against Industry
Introduction
200
Industrial Control Systems: Critical Infrastructure for
Modern Nations
200
Information Technology vs. Industrial Control
Systems: Why Traditional Infosec Practices May
Not Apply
201
CONTENTS
Vil
How Real-World Dependencies Can Magnify an
Attack: Infrastructure Attacks and Network
Topology
203
How a Cyber Attack Led to Water Contamination:
The Maroochy Water Breach
206
Summary
207
Suggested Further Reading
207
12.
Can Cyber Warfare Leave a
Nation in the Dark? Cyber
Attacks Against Electrical
Infrastructure
Introduction
210
Cyber Attacks Directed Against
Power Grids
210
Destroying a Generator with a Cyber Attack: The
Aurora Test
213
Taking the Power Grid Offline with Minimal
Effort: Attacks Leveraging Network
Topology
217
Summary
221
Suggested Further Reading
221
13.
Attacking Iranian Nuclear
Facilities: Stuxnet
Introduction
224
The Alleged Target: The Natanz Fuel Enrichment
Facility
224
How Stuxnet Targets Industrial Control
Systems
226
Stuxnet Successfully Targets the Natanz Fuel
Enrichment Plant
228
Stuxnet Is a Significant Advancement in
Malware 232
Stuxnet Invalidates Several Security
Assumptions
233
Implications for the Future
234
Summary
235
Suggested Further Reading
235
Conclusion and the Future of
Cyber-Warfare
241
Appendix I. Chapter
6:
LulzSec Hacktivities
245
Appendix II. Chapter
6:
Anonymous Timeline
257
Glossary
307
Index
313
|
any_adam_object | 1 |
author | Shakarian, Paulo Shakarian, Jana Ruef, Andrew |
author_facet | Shakarian, Paulo Shakarian, Jana Ruef, Andrew |
author_role | aut aut aut |
author_sort | Shakarian, Paulo |
author_variant | p s ps j s js a r ar |
building | Verbundindex |
bvnumber | BV041192207 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)859374725 (DE-599)BVBBV041192207 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01942nam a2200529zc 4500</leader><controlfield tag="001">BV041192207</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130909 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130729s2013 ne ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2013014772</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124078147</subfield><subfield code="c">alk. paper</subfield><subfield code="9">978-0-12407-814-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859374725</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041192207</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">ne</subfield><subfield code="c">NL</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.4</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shakarian, Paulo</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to cyber-warfare</subfield><subfield code="b">a multidisciplinary approach</subfield><subfield code="c">Paulo Shakarian ; Jana Shakarian ; Andrew Ruef</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Syngress Publ. [u.a.]</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 318 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">information assurance</subfield><subfield code="a">attribution</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Jana</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruef, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen 4</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026167253&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026167253</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090511</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090511</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV041192207 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:41:43Z |
institution | BVB |
isbn | 9780124078147 |
language | English |
lccn | 2013014772 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026167253 |
oclc_num | 859374725 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XVII, 318 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Syngress Publ. [u.a.] |
record_format | marc |
spelling | Shakarian, Paulo Verfasser aut Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian ; Jana Shakarian ; Andrew Ruef Boston [u.a.] Syngress Publ. [u.a.] 2013 XVII, 318 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd rswk-swf information assurance attribution (DE-588)4522595-3 Fallstudiensammlung gnd-content Information warfare (DE-588)4461975-3 s DE-604 Shakarian, Jana Verfasser aut Ruef, Andrew Verfasser aut Digitalisierung BSB Muenchen 4 application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026167253&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Shakarian, Paulo Shakarian, Jana Ruef, Andrew Introduction to cyber-warfare a multidisciplinary approach Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4522595-3 |
title | Introduction to cyber-warfare a multidisciplinary approach |
title_auth | Introduction to cyber-warfare a multidisciplinary approach |
title_exact_search | Introduction to cyber-warfare a multidisciplinary approach |
title_full | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian ; Jana Shakarian ; Andrew Ruef |
title_fullStr | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian ; Jana Shakarian ; Andrew Ruef |
title_full_unstemmed | Introduction to cyber-warfare a multidisciplinary approach Paulo Shakarian ; Jana Shakarian ; Andrew Ruef |
title_short | Introduction to cyber-warfare |
title_sort | introduction to cyber warfare a multidisciplinary approach |
title_sub | a multidisciplinary approach |
topic | Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare (DE-588)4461975-3 gnd |
topic_facet | Information warfare Case studies Cyberterrorism Cyberspace Security measures Computer crimes Data protection Information warfare Fallstudiensammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026167253&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT shakarianpaulo introductiontocyberwarfareamultidisciplinaryapproach AT shakarianjana introductiontocyberwarfareamultidisciplinaryapproach AT ruefandrew introductiontocyberwarfareamultidisciplinaryapproach |