The hacker and the state : cyber attacks and the new normal of geopolitics /
Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassif...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Cambridge, Massachusetts :
Harvard University Press,
2020.
|
Sujets: | |
Accès en ligne: | Texto completo |
Table des matières:
- Part one. Espionage: Exploiting home-field advantage
- Defeating encryption
- Building a backdoor
- Strategic espionage
- Counterintelligence
- Part two. Attack: Strategic sabotage
- Targeted disruption
- Coercion
- Testing and demonstration
- Part three. Destabilization: Election interference
- Exposure
- Theft, ransom, and manipulation
- Widespread disruption.