Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 565 trang
THÔNG TIN TÀI LIỆU
Cấu trúc
Cover Page
Title Page
ISBN 1591409918
Table of Contents (with page links)
Preface
Acknowledgment
Introduction to Cyber Warfare and
Cyber Terrorism
Section I
Terms, Concepts, and Definitions
Chapter I
Cyber Terrorism Attacks
Chapter II
Knowledge Management,
Terrorism, and Cyber Terrorism
Chapter III
Ten Information Warfare Trends
Chapter IV
Bits and Bytes vs.
Bullets and Bombs:
A New Form of Warfare
Chapter V
Infrastructures of Cyber Warfare
Chapter VI
Terrorism and the Internet
Chapter VII
Steganography
Chapter VIII
Cryptography
Chapter IX
A Roadmap for Delivering
Trustworthy IT Processes
Section II
Dynamic Aspects of
Cyber Warfare and
Cyber Terrorism
Chapter X
An Introduction to
Key Themes in the
Economics of Cyber Security
Chapter XI
Role of FS-ISAC in Countering
Cyber Terrorism
Chapter XII
Deception in Cyber Attacks
Chapter XIII
Deception in Defense of
Computer Systems
from Cyber Attack
Chapter XIV
Ethics of Cyber War Attacks
Chapter XV
International Outsourcing,
Personal Data, and
Cyber Terrorism:
Approaches for Oversight
Chapter XVI
Network-Based Passive
Information Gathering
Chapter XVII
Electronic Money Management
in Modern Online Businesses
Chapter XVIII
The Analysis of Money
Laundering Techniques
Chapter XIX
Spam, Spim, and
Illegal Advertisement
Chapter XX
Malware:
Specialized Trojan Horse
Chapter XXI
SQL Code Poisoning:
The Most Prevalent Technique for
Attacking Web Powered Databases
Section III
Human Aspects of
Cyber Warfare and
Cyber Terrorism
Chapter XXII
Electronic Surveillance
and Civil Rights
Chapter XXIII
Social Engineering
Chapter XXIV
Social Engineering
Chapter XXV
Behavioral Information Security
Chapter XXVI
Toward a Deeper
Understanding of Personnel
Anomaly Detection
Chapter XXVII
Cyber Stalking:
A Challenge for Web Security
Section IV
Technical Aspects of
Handling Cyber Attacks
Chapter XXVIII
Cyber Security Models
Chapter XXIX
Cyber War Defense:
Systems Development with
Integrated Security
Chapter XXX
Antispam Approaches Against
Information Warfare
Chapter XXXI
Denial-of-Service (DoS) Attacks:
Prevention, Intrusion Detection,
and Mitigation
Chapter XXXII
Large-Scale Monitoring of
Critical Digital Infrastructures
Chapter XXXIII
Public Key Infrastructures as
a Means for Increasing
Network Security
Chapter XXXIV
Use of Geographic Information
Systems in Cyber Warfare and
Cyber Counterterrorism
Chapter XXXV
Use of Remotely Sensed
Imagery in Cyber Warfare and
Cyber Counterterrorism
Section V
Identification, Authorization,
and Access Control
Chapter XXXVI
Hacking and Eavesdropping
Chapter XXXVII
Access Control Models
Chapter XXXVIII
An Overview of IDS Using
Anomaly Detection
Chapter XXXIX
Bio-Cyber Machine Gun:
A New Mode of Authentication Access
Using Visual Evoked Potentials
Chapter XL
Content-Based Policy
Specification for Multimedia
Authorization and
Access Control Model
Chapter XLI
Data Mining
Chapter XLII
Identification and
Localization of
Digital Addresses on
the Internet
Chapter XLIII
Identification Through
Data Mining
Section VI
Business Continuity
Chapter XLIV
A Model for
Emergency Response Systems
Chapter XLV
Bouncing Techniques
Chapter XLVI
Cyber Forensics
Chapter XLVII
Software Component
Survivability in
Information Warfare
Chapter XLVIII
Taxonomy for Computer
Security Incidents
Section VII
Cyber Warfare and
Cyber Terrorism:
National and International
Responses
Chapter XLIX
Measures for Ensuring
Data Protection and Citizen
Privacy Against the Threat
of Crime and Terrorism:
The European Response
Chapter L
EU Tackles Cybercrime
Chapter LI
The U.S. Military Response
to Cyber Warfare
Chapter LII
USA’s View on
World Cyber Security Issues
Chapter LIII
ECHELON and the NSA
Chapter LIV
International Cybercrime
Convention
Epilogue
Glossary
Compilation of References
About the Editors
Index (with page links)
Nội dung
[...]... orientation, cyberwarfare and cyberterrorism are realities that our civilization are now facing The term cyberterrorism was coined in 1996 by combining the terms cyberspace and terrorism The term has become widely accepted after being embraced by the United States Armed Forces A report generated in 1998 by the Center for Strategic and International Studies was entitled Cybercrime, Cyberterrorism, Cyberwarfare,... to our families who were deprived of our mental presence during the time of writing this book LJ & AC xiii Introduction to CyberWarfare and CyberTerrorism Andrew M Colarik, AndrewColarik.com, USA Lech J Janczewski, University of Auckland, New Zealand orIgIns and deFInItIons oF cyberWarFare and cyberterrorIsm The number of publicized terrorist attacks started to escalate beginning in the mid-1990s... i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2006.pdf Convention on Cybercrime, Council of Europe (2001) Proceedings of Convention Denning, D (1999) Information warfare and security Boston: Addison-Wesley Elmusharaf, M (2004) Cyber terrorism: The new kind of terrorism computer Retrieved April 8, 2004, from http://www.crime-research.org/articles /Cyber_ Terrorism_ new_kind _Terrorism xxviii Journal of Information Warfare, Australia, since 2001... (2003) Report targets U.S cyber- security The Internal Auditor, (February) Mearian, L (2002) Wall Street seeks cyberterror defenses Computerworld, (March) Misra, S (2003) High-tech terror The American City & Country, (June) Mukhtar, M (2004) Cyber terrorism: The new kind of terrorism Retrieved April 8, 2004, from http://www.crimeresearch.org/articles /Cyber_ Terrorism_ new_kind _Terrorism Nasir, B (1994,... ‘cybersecurity’ in China Gartner Section I Terms, Concepts, and Definitions In the introductory chapter, we defined cyberterrorism and cyberwarfare We have also presented a brief history of this phenomenon, as well as some of the major issues related to handling cyber attacks Cyberterrorism and cyberwarfare have existed for over 10 years In this relatively short period of time, it has undergone a significant... use the term cyberterrorism as: Cyberterrorism means premeditated, politically motivated attacks by sub national groups or clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combatant targets xiv Parallel to the term of cyberterrorism is an older term known as information warfare: Information warfare is defined... http://www.caida.org/analysis/security/code-red/ Center for Strategic and International Studies (1998) Cybercrime, cyberterrorism, cyberwarfare, averting electronic Waterloo CERT Coordination Center (2000, December) Results of the Security in ActiveX Workshop Software Engineering Institute, Carnegie Mellon University, USA Colin, B (1996) The future of cyberterrorism Proceedings of the 11th Annual International Symposium on Criminal... improving the systems and processes we are all now dependent on for our sustained futures Following this prologue, there is a chapter Introduction to CyberWarfare and CyberTerrorism formulating an overview with basic definitions of cyberterrorism and information warfare Basic recommendations on how to handle such attacks are also presented The main part of the book follows, containing more detailed discussions... steganography and other technologies are major contributors to carrying out cyberwarfare and cyber terrorist activities Knowledge of these techniques and the methods of battling them is an essential part in formulating a strategy against these activities As this book is a review of many of the issues related to cyberwarfare and cyber terrorism, for the convenience of our readers, we have included in this... opinions and views are presented: Chapter I CyberTerrorism Attacks / Kevin Curran, Kevin Concannon, and Sean McKeever 1 Chapter II Knowledge Management, Terrorism, and CyberTerrorism / Gil Ariely 7 Chapter III Ten Information Warfare Trends / Kenneth J Knapp and William R Boulton 17 Chapter IV Bits and Bytes vs Bullets and Bombs: A New Form of Warfare / John H Nugent and Mahesh Raisinghani . Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism / Mark R. Leipnik 291 Chapter XXXV Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism / Gang Gong and. orientation, cyber warfare and cyber terrorism are realities that our civilization are now facing. The term cyber terrorism was coined in 1996 by combining the terms cyberspace and terrorism. The. prologue, there is a chapter Introduction to Cyber Warfare and Cyber Terrorism formulating an overview with basic denitions of cyber terrorism and information warfare. Basic recommendations on how