1. Trang chủ
  2. » Công Nghệ Thông Tin

cyber warfare & cyber terrorism

565 577 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Cover Page

  • Title Page

  • ISBN 1591409918

  • Table of Contents (with page links)

  • Preface

  • Acknowledgment

  • Introduction to Cyber Warfare and Cyber Terrorism

  • Section I Terms, Concepts, and Definitions

    • Chapter I Cyber Terrorism Attacks

    • Chapter II Knowledge Management, Terrorism, and Cyber Terrorism

    • Chapter III Ten Information Warfare Trends

    • Chapter IV Bits and Bytes vs. Bullets and Bombs: A New Form of Warfare

    • Chapter V Infrastructures of Cyber Warfare

    • Chapter VI Terrorism and the Internet

    • Chapter VII Steganography

    • Chapter VIII Cryptography

    • Chapter IX A Roadmap for Delivering Trustworthy IT Processes

  • Section II Dynamic Aspects of Cyber Warfare and Cyber Terrorism

    • Chapter X An Introduction to Key Themes in the Economics of Cyber Security

    • Chapter XI Role of FS-ISAC in Countering Cyber Terrorism

    • Chapter XII Deception in Cyber Attacks

    • Chapter XIII Deception in Defense of Computer Systems from Cyber Attack

    • Chapter XIV Ethics of Cyber War Attacks

    • Chapter XV International Outsourcing, Personal Data, and Cyber Terrorism: Approaches for Oversight

    • Chapter XVI Network-Based Passive Information Gathering

    • Chapter XVII Electronic Money Management in Modern Online Businesses

    • Chapter XVIII The Analysis of Money Laundering Techniques

    • Chapter XIX Spam, Spim, and Illegal Advertisement

    • Chapter XX Malware: Specialized Trojan Horse

    • Chapter XXI SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases

  • Section III Human Aspects of Cyber Warfare and Cyber Terrorism

    • Chapter XXII Electronic Surveillance and Civil Rights

    • Chapter XXIII Social Engineering

    • Chapter XXIV Social Engineering

    • Chapter XXV Behavioral Information Security

    • Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection

    • Chapter XXVII Cyber Stalking: A Challenge for Web Security

  • Section IV Technical Aspects of Handling Cyber Attacks

    • Chapter XXVIII Cyber Security Models

    • Chapter XXIX Cyber War Defense: Systems Development with Integrated Security

    • Chapter XXX Antispam Approaches Against Information Warfare

    • Chapter XXXI Denial-of-Service (DoS) Attacks: Prevention, Intrusion Detection, and Mitigation

    • Chapter XXXII Large-Scale Monitoring of Critical Digital Infrastructures

    • Chapter XXXIII Public Key Infrastructures as a Means for Increasing Network Security

    • Chapter XXXIV Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism

    • Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism

  • Section V Identification, Authorization, and Access Control

    • Chapter XXXVI Hacking and Eavesdropping

    • Chapter XXXVII Access Control Models

    • Chapter XXXVIII An Overview of IDS Using Anomaly Detection

    • Chapter XXXIX Bio-Cyber Machine Gun: A New Mode of Authentication Access Using Visual Evoked Potentials

    • Chapter XL Content-Based Policy Specification for Multimedia Authorization and Access Control Model

    • Chapter XLI Data Mining

    • Chapter XLII Identification and Localization of Digital Addresses on the Internet

    • Chapter XLIII Identification Through Data Mining

  • Section VI Business Continuity

    • Chapter XLIV A Model for Emergency Response Systems

    • Chapter XLV Bouncing Techniques

    • Chapter XLVI Cyber Forensics

    • Chapter XLVII Software Component Survivability in Information Warfare

    • Chapter XLVIII Taxonomy for Computer Security Incidents

  • Section VII Cyber Warfare and Cyber Terrorism: National and International Responses

    • Chapter XLIX Measures for Ensuring Data Protection and Citizen Privacy Against the Threat of Crime and Terrorism: The European Response

    • Chapter L EU Tackles Cybercrime

    • Chapter LI The U.S. Military Response to Cyber Warfare

    • Chapter LII USA’s View on World Cyber Security Issues

    • Chapter LIII ECHELON and the NSA

    • Chapter LIV International Cybercrime Convention

  • Epilogue

  • Glossary

  • Compilation of References

  • About the Editors

  • Index (with page links)

Nội dung

[...]... orientation, cyber warfare and cyber terrorism are realities that our civilization are now facing The term cyber terrorism was coined in 1996 by combining the terms cyberspace and terrorism The term has become widely accepted after being embraced by the United States Armed Forces A report generated in 1998 by the Center for Strategic and International Studies was entitled Cybercrime, Cyberterrorism, Cyberwarfare,... to our families who were deprived of our mental presence during the time of writing this book LJ & AC xiii Introduction to Cyber Warfare and Cyber Terrorism Andrew M Colarik, AndrewColarik.com, USA Lech J Janczewski, University of Auckland, New Zealand orIgIns and deFInItIons oF cyber WarFare and cyber terrorIsm The number of publicized terrorist attacks started to escalate beginning in the mid-1990s... i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2006.pdf Convention on Cybercrime, Council of Europe (2001) Proceedings of Convention Denning, D (1999) Information warfare and security Boston: Addison-Wesley Elmusharaf, M (2004) Cyber terrorism: The new kind of terrorism computer Retrieved April 8, 2004, from http://www.crime-research.org/articles /Cyber_ Terrorism_ new_kind _Terrorism xxviii Journal of Information Warfare, Australia, since 2001... (2003) Report targets U.S cyber- security The Internal Auditor, (February) Mearian, L (2002) Wall Street seeks cyberterror defenses Computerworld, (March) Misra, S (2003) High-tech terror The American City & Country, (June) Mukhtar, M (2004) Cyber terrorism: The new kind of terrorism Retrieved April 8, 2004, from http://www.crimeresearch.org/articles /Cyber_ Terrorism_ new_kind _Terrorism Nasir, B (1994,... ‘cybersecurity’ in China Gartner Section I Terms, Concepts, and Definitions In the introductory chapter, we defined cyber terrorism and cyber warfare We have also presented a brief history of this phenomenon, as well as some of the major issues related to handling cyber attacks Cyber terrorism and cyber warfare have existed for over 10 years In this relatively short period of time, it has undergone a significant... use the term cyber terrorism as: Cyber terrorism means premeditated, politically motivated attacks by sub national groups or clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combatant targets xiv Parallel to the term of cyber terrorism is an older term known as information warfare: Information warfare is defined... http://www.caida.org/analysis/security/code-red/ Center for Strategic and International Studies (1998) Cybercrime, cyberterrorism, cyberwarfare, averting electronic Waterloo CERT Coordination Center (2000, December) Results of the Security in ActiveX Workshop Software Engineering Institute, Carnegie Mellon University, USA Colin, B (1996) The future of cyberterrorism Proceedings of the 11th Annual International Symposium on Criminal... improving the systems and processes we are all now dependent on for our sustained futures Following this prologue, there is a chapter Introduction to Cyber Warfare and Cyber Terrorism formulating an overview with basic definitions of cyber terrorism and information warfare Basic recommendations on how to handle such attacks are also presented The main part of the book follows, containing more detailed discussions... steganography and other technologies are major contributors to carrying out cyber warfare and cyber terrorist activities Knowledge of these techniques and the methods of battling them is an essential part in formulating a strategy against these activities As this book is a review of many of the issues related to cyber warfare and cyber terrorism, for the convenience of our readers, we have included in this... opinions and views are presented: Chapter I Cyber Terrorism Attacks / Kevin Curran, Kevin Concannon, and Sean McKeever 1 Chapter II Knowledge Management, Terrorism, and Cyber Terrorism / Gil Ariely 7 Chapter III Ten Information Warfare Trends / Kenneth J Knapp and William R Boulton 17 Chapter IV Bits and Bytes vs Bullets and Bombs: A New Form of Warfare / John H Nugent and Mahesh Raisinghani . Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism / Mark R. Leipnik 291 Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism / Gang Gong and. orientation, cyber warfare and cyber terrorism are realities that our civilization are now facing. The term cyber terrorism was coined in 1996 by combining the terms cyberspace and terrorism. The. prologue, there is a chapter Introduction to Cyber Warfare and Cyber Terrorism formulating an overview with basic denitions of cyber terrorism and information warfare. Basic recommendations on how

Ngày đăng: 25/03/2014, 11:13

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN