Introduction to cyber-warfare :: a multidisciplinary approach /
Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global mark...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam [Netherlands] :
Morgan Kaufmann Publishers, an imprint of Elsevier,
[2013]
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent. |
Beschreibung: | 1 online resource (xvii, 318 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780124079267 0124079261 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn846492852 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130603s2013 ne ob 001 0 eng d | ||
010 | |z 2013014772 | ||
040 | |a N$T |b eng |e pn |c N$T |d OPELS |d VRC |d E7B |d ITS |d YDXCP |d OCLCA |d NOC |d UPM |d TEFOD |d COO |d TEFOD |d DEBSZ |d UAB |d TPH |d DKDLA |d UKDOC |d OCLCQ |d TEFOD |d OCLCQ |d D6H |d LOA |d ICA |d LVT |d AGLDB |d K6U |d PIFAG |d FVL |d ZCU |d MERUC |d SAV |d OCLCQ |d JBG |d U3W |d OCLCF |d STF |d TAMCT |d WRM |d OCLCQ |d VTS |d LND |d ICG |d OCLCQ |d OTZ |d A6Q |d LEAUB |d DKC |d OCLCQ |d HS0 |d UKCRE |d AJS |d S2H |d OCLCO |d OCLCA |d OCLCQ |d OCL |d QGK |d OCLCO |d OCLCQ |d INARC |d OCLCO | ||
019 | |a 852787563 |a 962189031 |a 972037653 |a 992031992 |a 1037689577 |a 1038589886 |a 1083556988 |a 1109195164 |a 1153560285 |a 1162053077 |a 1241795785 | ||
020 | |a 9780124079267 |q (electronic bk.) | ||
020 | |a 0124079261 |q (electronic bk.) | ||
020 | |z 9780124078147 | ||
020 | |z 0124078141 | ||
035 | |a (OCoLC)846492852 |z (OCoLC)852787563 |z (OCoLC)962189031 |z (OCoLC)972037653 |z (OCoLC)992031992 |z (OCoLC)1037689577 |z (OCoLC)1038589886 |z (OCoLC)1083556988 |z (OCoLC)1109195164 |z (OCoLC)1153560285 |z (OCoLC)1162053077 |z (OCoLC)1241795785 | ||
037 | |a 6B1C4816-25DC-48EA-8BE9-0978992555FB |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a U163 |b .S438 2013eb | |
072 | 7 | |a HIS |x 027060 |2 bisacsh | |
082 | 7 | |a 355.4 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Shakarian, Paulo. |0 http://id.loc.gov/authorities/names/n2012010995 | |
245 | 1 | 0 | |a Introduction to cyber-warfare : |b a multidisciplinary approach / |c Paulo Shakarian, Jana Shakarian & Andrew Ruef. |
260 | |a Amsterdam [Netherlands] : |b Morgan Kaufmann Publishers, an imprint of Elsevier, |c [2013] | ||
300 | |a 1 online resource (xvii, 318 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
520 | |a Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent. | ||
505 | 0 | |a 1. Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I. Cyber Attack -- 2. Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3. How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II. Cyber Espionage And Exploitation -- 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- Commonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9. Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10. How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III. Cyber Operations For Infrastructure Attack -- 11. Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13. Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future -- Summary -- Suggested Further Reading -- Conclusion and the Future of Cyber-Warfare. | |
546 | |a English. | ||
650 | 0 | |a Information warfare |v Case studies. | |
650 | 0 | |a Cyberterrorism. |0 http://id.loc.gov/authorities/subjects/sh00001974 | |
650 | 0 | |a Cyberspace |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2021002499 | |
650 | 0 | |a Computer crimes. |0 http://id.loc.gov/authorities/subjects/sh85029492 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 6 | |a Guerre de l'information |v Études de cas. | |
650 | 6 | |a Cyberterrorisme. | |
650 | 6 | |a Criminalité informatique. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 7 | |a HISTORY |x Military |x Strategy. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
655 | 7 | |a Case studies |2 fast | |
655 | 7 | |a Case studies. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2017026140 | |
655 | 7 | |a Études de cas. |2 rvmgf | |
700 | 1 | |a Shakarian, Jana. | |
700 | 1 | |a Ruef, Andrew. |0 http://id.loc.gov/authorities/names/n2013023912 | |
776 | 0 | 8 | |i Print version: |a Shakarian, Paulo. |t Introduction to cyber-warfare. |d Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013] |z 9780124078147 |w (DLC) 2013014772 |w (OCoLC)843025546 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=503590 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780124078147 |3 Volltext |
938 | |a Internet Archive |b INAR |n introductiontocy00unse | ||
938 | |a 123Library |b 123L |n 101429 | ||
938 | |a ebrary |b EBRY |n ebr10704774 | ||
938 | |a EBSCOhost |b EBSC |n 503590 | ||
938 | |a YBP Library Services |b YANK |n 10735319 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn846492852 |
---|---|
_version_ | 1816882233923862528 |
adam_text | |
any_adam_object | |
author | Shakarian, Paulo |
author2 | Shakarian, Jana Ruef, Andrew |
author2_role | |
author2_variant | j s js a r ar |
author_GND | http://id.loc.gov/authorities/names/n2012010995 http://id.loc.gov/authorities/names/n2013023912 |
author_facet | Shakarian, Paulo Shakarian, Jana Ruef, Andrew |
author_role | |
author_sort | Shakarian, Paulo |
author_variant | p s ps |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 .S438 2013eb |
callnumber-search | U163 .S438 2013eb |
callnumber-sort | U 3163 S438 42013EB |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | 1. Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I. Cyber Attack -- 2. Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3. How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II. Cyber Espionage And Exploitation -- 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- Commonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9. Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10. How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III. Cyber Operations For Infrastructure Attack -- 11. Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13. Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future -- Summary -- Suggested Further Reading -- Conclusion and the Future of Cyber-Warfare. |
ctrlnum | (OCoLC)846492852 |
dewey-full | 355.4 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.4 |
dewey-search | 355.4 |
dewey-sort | 3355.4 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>10629cam a2200757 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn846492852</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">130603s2013 ne ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2013014772</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OPELS</subfield><subfield code="d">VRC</subfield><subfield code="d">E7B</subfield><subfield code="d">ITS</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCA</subfield><subfield code="d">NOC</subfield><subfield code="d">UPM</subfield><subfield code="d">TEFOD</subfield><subfield code="d">COO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">UAB</subfield><subfield code="d">TPH</subfield><subfield code="d">DKDLA</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">LOA</subfield><subfield code="d">ICA</subfield><subfield code="d">LVT</subfield><subfield code="d">AGLDB</subfield><subfield code="d">K6U</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">TAMCT</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">LND</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OTZ</subfield><subfield code="d">A6Q</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HS0</subfield><subfield code="d">UKCRE</subfield><subfield code="d">AJS</subfield><subfield code="d">S2H</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">852787563</subfield><subfield code="a">962189031</subfield><subfield code="a">972037653</subfield><subfield code="a">992031992</subfield><subfield code="a">1037689577</subfield><subfield code="a">1038589886</subfield><subfield code="a">1083556988</subfield><subfield code="a">1109195164</subfield><subfield code="a">1153560285</subfield><subfield code="a">1162053077</subfield><subfield code="a">1241795785</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124079267</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124079261</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780124078147</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0124078141</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846492852</subfield><subfield code="z">(OCoLC)852787563</subfield><subfield code="z">(OCoLC)962189031</subfield><subfield code="z">(OCoLC)972037653</subfield><subfield code="z">(OCoLC)992031992</subfield><subfield code="z">(OCoLC)1037689577</subfield><subfield code="z">(OCoLC)1038589886</subfield><subfield code="z">(OCoLC)1083556988</subfield><subfield code="z">(OCoLC)1109195164</subfield><subfield code="z">(OCoLC)1153560285</subfield><subfield code="z">(OCoLC)1162053077</subfield><subfield code="z">(OCoLC)1241795785</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">6B1C4816-25DC-48EA-8BE9-0978992555FB</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.S438 2013eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027060</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shakarian, Paulo.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2012010995</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Introduction to cyber-warfare :</subfield><subfield code="b">a multidisciplinary approach /</subfield><subfield code="c">Paulo Shakarian, Jana Shakarian & Andrew Ruef.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam [Netherlands] :</subfield><subfield code="b">Morgan Kaufmann Publishers, an imprint of Elsevier,</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 318 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I. Cyber Attack -- 2. Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3. How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II. Cyber Espionage And Exploitation -- 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- Commonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9. Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10. How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III. Cyber Operations For Infrastructure Attack -- 11. Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13. Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future -- Summary -- Suggested Further Reading -- Conclusion and the Future of Cyber-Warfare.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00001974</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2021002499</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029492</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre de l'information</subfield><subfield code="v">Études de cas.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY</subfield><subfield code="x">Military</subfield><subfield code="x">Strategy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Case studies</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Case studies.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2017026140</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Études de cas.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Jana.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruef, Andrew.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2013023912</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Shakarian, Paulo.</subfield><subfield code="t">Introduction to cyber-warfare.</subfield><subfield code="d">Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013]</subfield><subfield code="z">9780124078147</subfield><subfield code="w">(DLC) 2013014772</subfield><subfield code="w">(OCoLC)843025546</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=503590</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780124078147</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">introductiontocy00unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">101429</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10704774</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">503590</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">10735319</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Case studies fast Case studies. lcgft http://id.loc.gov/authorities/genreForms/gf2017026140 Études de cas. rvmgf |
genre_facet | Case studies Case studies. Études de cas. |
id | ZDB-4-EBA-ocn846492852 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:22Z |
institution | BVB |
isbn | 9780124079267 0124079261 |
language | English |
oclc_num | 846492852 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvii, 318 pages) |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Morgan Kaufmann Publishers, an imprint of Elsevier, |
record_format | marc |
spelling | Shakarian, Paulo. http://id.loc.gov/authorities/names/n2012010995 Introduction to cyber-warfare : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian & Andrew Ruef. Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013] 1 online resource (xvii, 318 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Includes bibliographical references and index. Print version record. Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent. 1. Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I. Cyber Attack -- 2. Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3. How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II. Cyber Espionage And Exploitation -- 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- Commonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9. Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10. How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III. Cyber Operations For Infrastructure Attack -- 11. Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13. Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future -- Summary -- Suggested Further Reading -- Conclusion and the Future of Cyber-Warfare. English. Information warfare Case studies. Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Guerre de l'information Études de cas. Cyberterrorisme. Criminalité informatique. Protection de l'information (Informatique) HISTORY Military Strategy. bisacsh Cyberspace Security measures fast Computer crimes fast Cyberterrorism fast Data protection fast Information warfare fast Case studies fast Case studies. lcgft http://id.loc.gov/authorities/genreForms/gf2017026140 Études de cas. rvmgf Shakarian, Jana. Ruef, Andrew. http://id.loc.gov/authorities/names/n2013023912 Print version: Shakarian, Paulo. Introduction to cyber-warfare. Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013] 9780124078147 (DLC) 2013014772 (OCoLC)843025546 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=503590 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780124078147 Volltext |
spellingShingle | Shakarian, Paulo Introduction to cyber-warfare : a multidisciplinary approach / 1. Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I. Cyber Attack -- 2. Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3. How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II. Cyber Espionage And Exploitation -- 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- Commonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9. Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10. How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III. Cyber Operations For Infrastructure Attack -- 11. Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13. Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future -- Summary -- Suggested Further Reading -- Conclusion and the Future of Cyber-Warfare. Information warfare Case studies. Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Guerre de l'information Études de cas. Cyberterrorisme. Criminalité informatique. Protection de l'information (Informatique) HISTORY Military Strategy. bisacsh Cyberspace Security measures fast Computer crimes fast Cyberterrorism fast Data protection fast Information warfare fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh00001974 http://id.loc.gov/authorities/subjects/sh2021002499 http://id.loc.gov/authorities/subjects/sh85029492 http://id.loc.gov/authorities/subjects/sh85035859 http://id.loc.gov/authorities/genreForms/gf2017026140 |
title | Introduction to cyber-warfare : a multidisciplinary approach / |
title_auth | Introduction to cyber-warfare : a multidisciplinary approach / |
title_exact_search | Introduction to cyber-warfare : a multidisciplinary approach / |
title_full | Introduction to cyber-warfare : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian & Andrew Ruef. |
title_fullStr | Introduction to cyber-warfare : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian & Andrew Ruef. |
title_full_unstemmed | Introduction to cyber-warfare : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian & Andrew Ruef. |
title_short | Introduction to cyber-warfare : |
title_sort | introduction to cyber warfare a multidisciplinary approach |
title_sub | a multidisciplinary approach / |
topic | Information warfare Case studies. Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Guerre de l'information Études de cas. Cyberterrorisme. Criminalité informatique. Protection de l'information (Informatique) HISTORY Military Strategy. bisacsh Cyberspace Security measures fast Computer crimes fast Cyberterrorism fast Data protection fast Information warfare fast |
topic_facet | Information warfare Case studies. Cyberterrorism. Cyberspace Security measures. Computer crimes. Data protection. Guerre de l'information Études de cas. Cyberterrorisme. Criminalité informatique. Protection de l'information (Informatique) HISTORY Military Strategy. Cyberspace Security measures Computer crimes Cyberterrorism Data protection Information warfare Case studies Case studies. Études de cas. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=503590 https://www.sciencedirect.com/science/book/9780124078147 |
work_keys_str_mv | AT shakarianpaulo introductiontocyberwarfareamultidisciplinaryapproach AT shakarianjana introductiontocyberwarfareamultidisciplinaryapproach AT ruefandrew introductiontocyberwarfareamultidisciplinaryapproach |