Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    gbv_1696647517
    Umfang: 1 online resource (256 pages)
    ISBN: 9780124079267
    Inhalt: Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it. Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent.
    Inhalt: Front Cover -- Introduction to Cyber-Warfare: A Multidisciplinary Approach -- Copyright -- Contents -- Preface -- Foreword -- Introduction -- References -- Biography -- Chapter 1: Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Origin -- Structure -- Purpose -- Information Assurance -- References -- Part: I Cyber Attack -- Chapter 2: Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- The Estonian Government´s Response -- The End of the Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- References -- Chapter 3: How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Objectives of the Attack -- Coordination with Conventional Forces -- Reconnaissance and Preparation -- Attribution -- Preparing for a Cyber-Capable Adversary -- Cyber as a Battlefield Operating System -- The Cyber Aspect of the Area of Interest -- Cyber Reconnaissance and Surveillance (R&S) -- Summary -- Suggested Further Reading -- References -- Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War´´ of 2006 -- The Information Operations of Hezbollah -- Hezbollah Hijacks IP Addresses -- Civilians in the Cyber Melee: Operation Cast Lead -- IO and Cyber Warfare in the 2008 Israel-Hamas War -- Summary -- Suggested Further Reading -- References.
    Anmerkung: Description based on publisher supplied metadata and other sources
    Weitere Ausg.: ISBN 9780124078147
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9780124078147
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz