The hacker and the state : cyber attacks and the new normal of geopolitics /
Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassif...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridge, Massachusetts :
Harvard University Press,
2020.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Part one. Espionage: Exploiting home-field advantage
- Defeating encryption
- Building a backdoor
- Strategic espionage
- Counterintelligence
- Part two. Attack: Strategic sabotage
- Targeted disruption
- Coercion
- Testing and demonstration
- Part three. Destabilization: Election interference
- Exposure
- Theft, ransom, and manipulation
- Widespread disruption.