Cargando…

Encyclopedia of cyber warfare /

"This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Springer, Paul J. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Barbara, California : ABC-CLIO, [2017]
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Title; Copyright; Contents; List of Entries; Guide to Related Topics; List of Documents; Preface; Introduction; A-Z Entries; A; Advanced Persistent Threat (APT); Air Gapping; Alexander, Keith B.; Alperovitch, Dmitri; Al Qaeda; Anonymous; Antivirus Software; Apple Inc.; Aramco Attack; Arpanet; Arquilla, John; Assange, Julian; Attribution; Authentication; B; Baidu; Bitcoin; Black Hat; Blacklist; Botnet; Brenner, Joel F.; Bush, George W.; C; Carpenter, Shawn; Cebrowski, Arthur K.; Central Intelligence Agency (CIA); Certificates; Clarke, Richard A.; Closed Network; Cloud Computing
  • Code Red WormComprehensive National Cybersecurity Initiative (CNCI); Computer Emergency Response Team (CERT); Conficker Worm; Cray, Seymour; Cryptography; Cyber Attack; Cyber Crime; Cyber Defence Management Authority (CDMA); Cyber Defense; Cyber-Defense Exercise; Cyber Deterrence; Cyber-Equivalence Doctrine; Cyber Escalation; Cyber Espionage; Cyber Ethics; Cyber Sabotage; Cyber Security; Cyberspace Policy Review (2009); Cyber Terrorism; Cyber War; Cyber Warriors; Cyber Weapon; D; Dark Web; Deep Web; Defense Advanced Research Projects Agency (DARPA); Defense Information Systems Agency (DISA)
  • Department of Defense (DOD)Department of Energy (DOE); Department of Homeland Security (DHS); Department of Justice (DOJ); Distributed Denial-of-Service (DDOS) Attack; Domain Name System (DNS); E; E-Commerce; Einstein (Cyber System); Electromagnetic Pulse (EMP); Encryption; Escalation Dominance; Estonian Cyber Attack (2007); Ethernet; Evron, Gadi; F; Federal Bureau of Investigation (FBI); Fireeye; Firewall; Flame Worm; Foreign Intelligence Surveillance Act (FISA); 4chan; G; Gates, Bill; Gates, Robert M.; Gauss Worm; Georbot; Georgian Cyber Attack (2008); Ghostnet; Google; H; Hacker
  • HacktivistHardware; Hayden, Michael V.; Honeypot; I; Identity Theft; Iloveyou Virus; Information Warfare Weapons Treaty; Informatization; Infrastructure; Intel Corporation; Intellectual Property; Internet; Internet Corporation for Assigned Names and Numbers (ICANN); Internet Governance; Internet Protocol (IP) Address; Internet Relay Chat (IRC); Internet Service Provider (ISP); Interpol; Iran Cyber Capabilities; Islamic State in Iraq and Syria (ISIS); Israel Cyber Capabilities; J; JPMorgan Hack; Just War; Jwics Network; K; Kaspersky Lab; Kaspersky, Yevgeniy "Eugene" Valentinovich; L
  • Laws of Armed ConflictLibicki, Martin C.; Live Free or Die Hard; Logic Bomb; Low Orbit Ion Cannon (lOIC); Lulzsec; M; Malware; Mandia, Kevin; Mandiant Corporation; Manning, Bradley; Matrix, The; Mcafee; Microsoft Corporation; Microsoft Windows; Minimum Essential Emergency Communications Network (MEECN); Mitnick, Kevin; Moonlight Maze; Moore's Law; Ms Blaster Worm; Mydoom Virus; N; National Cyber Security Strategy; National Infrastructure Advisory Council (NIAC); National Infrastructure Protection Plan (NIPP); National Institute of Standards and Technology (NIST)