Introduction to cyber-warfare : a multidisciplinary approach /
Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global mark...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam [Netherlands] :
Morgan Kaufmann Publishers, an imprint of Elsevier,
[2013]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | SCIDIR_ocn846492852 | ||
003 | OCoLC | ||
005 | 20231117044859.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130603s2013 ne ob 001 0 eng d | ||
010 | |z 2013014772 | ||
040 | |a N$T |b eng |e pn |c N$T |d OPELS |d VRC |d E7B |d ITS |d YDXCP |d OCLCA |d NOC |d UPM |d TEFOD |d COO |d TEFOD |d DEBSZ |d UAB |d TPH |d DKDLA |d UKDOC |d OCLCQ |d TEFOD |d OCLCQ |d D6H |d LOA |d ICA |d LVT |d AGLDB |d K6U |d PIFAG |d FVL |d ZCU |d MERUC |d SAV |d OCLCQ |d JBG |d U3W |d OCLCF |d STF |d TAMCT |d WRM |d OCLCQ |d VTS |d LND |d ICG |d OCLCQ |d OTZ |d A6Q |d LEAUB |d DKC |d OCLCQ |d HS0 |d UKCRE |d AJS |d S2H |d OCLCO |d OCLCA |d OCLCQ |d OCL |d QGK |d OCLCO |d OCLCQ |d INARC |d OCLCO | ||
019 | |a 852787563 |a 962189031 |a 972037653 |a 992031992 |a 1037689577 |a 1038589886 |a 1083556988 |a 1109195164 |a 1153560285 |a 1162053077 |a 1241795785 | ||
020 | |a 9780124079267 |q (electronic bk.) | ||
020 | |a 0124079261 |q (electronic bk.) | ||
020 | |z 9780124078147 | ||
020 | |z 0124078141 | ||
035 | |a (OCoLC)846492852 |z (OCoLC)852787563 |z (OCoLC)962189031 |z (OCoLC)972037653 |z (OCoLC)992031992 |z (OCoLC)1037689577 |z (OCoLC)1038589886 |z (OCoLC)1083556988 |z (OCoLC)1109195164 |z (OCoLC)1153560285 |z (OCoLC)1162053077 |z (OCoLC)1241795785 | ||
050 | 4 | |a U163 |b .S438 2013eb | |
072 | 7 | |a HIS |x 027060 |2 bisacsh | |
082 | 0 | 4 | |a 355.4 |2 23 |
100 | 1 | |a Shakarian, Paulo. | |
245 | 1 | 0 | |a Introduction to cyber-warfare : |b a multidisciplinary approach / |c Paulo Shakarian, Jana Shakarian & Andrew Ruef. |
260 | |a Amsterdam [Netherlands] : |b Morgan Kaufmann Publishers, an imprint of Elsevier, |c [2013] | ||
300 | |a 1 online resource (xvii, 318 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
520 | |a Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent. | ||
505 | 0 | |a 1. Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I. Cyber Attack -- 2. Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3. How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II. Cyber Espionage And Exploitation -- 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- Commonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9. Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10. How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III. Cyber Operations For Infrastructure Attack -- 11. Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13. Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future -- Summary -- Suggested Further Reading -- Conclusion and the Future of Cyber-Warfare. | |
546 | |a English. | ||
650 | 0 | |a Information warfare |v Case studies. | |
650 | 0 | |a Cyberterrorism. | |
650 | 0 | |a Cyberspace |x Security measures. | |
650 | 0 | |a Computer crimes. | |
650 | 0 | |a Data protection. | |
650 | 6 | |a Guerre de l'information |0 (CaQQLa)201-0275013 |v �Etudes de cas. |0 (CaQQLa)201-0376950 | |
650 | 6 | |a Cyberterrorisme. |0 (CaQQLa)201-0343461 | |
650 | 6 | |a Criminalit�e informatique. |0 (CaQQLa)201-0056438 | |
650 | 6 | |a Protection de l'information (Informatique) |0 (CaQQLa)201-0061151 | |
650 | 7 | |a HISTORY |x Military |x Strategy. |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast |0 (OCoLC)fst02031378 | |
650 | 7 | |a Computer crimes |2 fast |0 (OCoLC)fst00872063 | |
650 | 7 | |a Cyberterrorism |2 fast |0 (OCoLC)fst00885802 | |
650 | 7 | |a Data protection |2 fast |0 (OCoLC)fst00887958 | |
650 | 7 | |a Information warfare |2 fast |0 (OCoLC)fst00973186 | |
655 | 7 | |a Case studies |2 fast |0 (OCoLC)fst01423765 | |
655 | 7 | |a Case studies. |2 lcgft | |
655 | 7 | |a �Etudes de cas. |2 rvmgf |0 (CaQQLa)RVMGF-000001726 | |
700 | 1 | |a Shakarian, Jana. | |
700 | 1 | |a Ruef, Andrew. | |
776 | 0 | 8 | |i Print version: |a Shakarian, Paulo. |t Introduction to cyber-warfare. |d Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013] |z 9780124078147 |w (DLC) 2013014772 |w (OCoLC)843025546 |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/book/9780124078147 |z Texto completo |
856 | 4 | 1 | |u http://0-www.sciencedirect.com.emu.londonmet.ac.uk/science/book/9780124078147 |z Texto completo |