Cyber terrorism: political and economic implications
This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distr...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pa
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
c2006
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-706 DE-1050 DE-1049 DE-83 Volltext |
Zusammenfassung: | This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, this book puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives |
Beschreibung: | Includes bibliographical references (p. 163-165) and index. - Title from PDF t.p. (viewed on June 5, 2010) |
Beschreibung: | 1 Online-Ressource (electronic texts (xvii, 172 p. ill.)) digital files |
DOI: | 10.4018/978-1-59904-021-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047945370 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220419s2006 |||| o||u| ||||||eng d | ||
024 | 7 | |a 10.4018/978-1-59904-021-9 |2 doi | |
035 | |a (ZDB-1-IGE)068993668 | ||
035 | |a (OCoLC)1312693541 | ||
035 | |a (DE-599)BVBBV047945370 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-706 |a DE-1050 |a DE-1049 |a DE-83 | ||
082 | 0 | |a 363.325 |2 22 | |
100 | 1 | |a Colarik, Andrew M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber terrorism |b political and economic implications |c Andrew Michael Colarik |
264 | 1 | |a Hershey, Pa |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |c c2006 | |
300 | |a 1 Online-Ressource (electronic texts (xvii, 172 p. ill.)) |b digital files | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 163-165) and index. - Title from PDF t.p. (viewed on June 5, 2010) | ||
520 | |a This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, this book puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives | ||
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Information superhighway |x Economic aspects | |
650 | 4 | |a Information warfare |x Political aspects | |
650 | 4 | |a Asymmetric warfare | |
650 | 4 | |a Computer networks |x Security measures | |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-59904-021-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-IGE |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033326800 | |
966 | e | |u https://doi.org/10.4018/978-1-59904-021-9 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-021-9 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-021-9 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-021-9 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-59904-021-9 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1808138582977675264 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Colarik, Andrew M. |
author_facet | Colarik, Andrew M. |
author_role | aut |
author_sort | Colarik, Andrew M. |
author_variant | a m c am amc |
building | Verbundindex |
bvnumber | BV047945370 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)068993668 (OCoLC)1312693541 (DE-599)BVBBV047945370 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
discipline_str_mv | Soziologie |
doi_str_mv | 10.4018/978-1-59904-021-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV047945370</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220419s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-59904-021-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)068993668</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1312693541</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047945370</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Colarik, Andrew M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber terrorism</subfield><subfield code="b">political and economic implications</subfield><subfield code="c">Andrew Michael Colarik</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pa</subfield><subfield code="b">IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (electronic texts (xvii, 172 p. ill.))</subfield><subfield code="b">digital files</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 163-165) and index. - Title from PDF t.p. (viewed on June 5, 2010)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, this book puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information superhighway</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Asymmetric warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-59904-021-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033326800</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-021-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-021-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-021-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-021-9</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-59904-021-9</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047945370 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:36:12Z |
indexdate | 2024-08-23T01:08:47Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033326800 |
oclc_num | 1312693541 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
owner_facet | DE-898 DE-BY-UBR DE-706 DE-1050 DE-1049 DE-83 |
physical | 1 Online-Ressource (electronic texts (xvii, 172 p. ill.)) digital files |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |
record_format | marc |
spelling | Colarik, Andrew M. Verfasser aut Cyber terrorism political and economic implications Andrew Michael Colarik Hershey, Pa IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) c2006 1 Online-Ressource (electronic texts (xvii, 172 p. ill.)) digital files txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. 163-165) and index. - Title from PDF t.p. (viewed on June 5, 2010) This book is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, this book puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives Cyberterrorism Computer crimes Information superhighway Economic aspects Information warfare Political aspects Asymmetric warfare Computer networks Security measures https://doi.org/10.4018/978-1-59904-021-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Colarik, Andrew M. Cyber terrorism political and economic implications Cyberterrorism Computer crimes Information superhighway Economic aspects Information warfare Political aspects Asymmetric warfare Computer networks Security measures |
title | Cyber terrorism political and economic implications |
title_auth | Cyber terrorism political and economic implications |
title_exact_search | Cyber terrorism political and economic implications |
title_exact_search_txtP | Cyber terrorism political and economic implications |
title_full | Cyber terrorism political and economic implications Andrew Michael Colarik |
title_fullStr | Cyber terrorism political and economic implications Andrew Michael Colarik |
title_full_unstemmed | Cyber terrorism political and economic implications Andrew Michael Colarik |
title_short | Cyber terrorism |
title_sort | cyber terrorism political and economic implications |
title_sub | political and economic implications |
topic | Cyberterrorism Computer crimes Information superhighway Economic aspects Information warfare Political aspects Asymmetric warfare Computer networks Security measures |
topic_facet | Cyberterrorism Computer crimes Information superhighway Economic aspects Information warfare Political aspects Asymmetric warfare Computer networks Security measures |
url | https://doi.org/10.4018/978-1-59904-021-9 |
work_keys_str_mv | AT colarikandrewm cyberterrorismpoliticalandeconomicimplications |