Introduction to cyber-warfare : a multidisciplinary approach /

Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global mark...

Full description

Saved in:
Bibliographic Details
Main Author: Shakarian, Paulo.
Other Authors: Shakarian, Jana., Ruef, Andrew.
Format: eBook
Published: Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013]
Online Access:CONNECT
LEADER 09980cam a2200625Ka 4500
001 mig00005330139
003 OCoLC
005 20210517045725.8
006 m o d
007 cr cnu---unuuu
008 130603s2013 ne ob 001 0 eng d
010 |z  2013014772 
019 |a 852787563  |a 962189031  |a 972037653  |a 992031992  |a 1037689577  |a 1038589886  |a 1083556988  |a 1109195164  |a 1153560285  |a 1162053077 
020 |a 9780124079267  |q (electronic bk.) 
020 |a 0124079261  |q (electronic bk.) 
020 |z 9780124078147 
020 |z 0124078141 
035 |a (OCoLC)846492852  |z (OCoLC)852787563  |z (OCoLC)962189031  |z (OCoLC)972037653  |z (OCoLC)992031992  |z (OCoLC)1037689577  |z (OCoLC)1038589886  |z (OCoLC)1083556988  |z (OCoLC)1109195164  |z (OCoLC)1153560285  |z (OCoLC)1162053077 
035 0 0 |a ocm00000001wrldshrocn846492852 
037 |a 6B1C4816-25DC-48EA-8BE9-0978992555FB  |b OverDrive, Inc.  |n 
040 |a N$T  |b eng  |e pn  |c N$T  |d OPELS  |d VRC  |d E7B  |d ITS  |d YDXCP  |d OCLCA  |d NOC  |d UPM  |d TEFOD  |d COO  |d TEFOD  |d DEBSZ  |d UAB  |d TPH  |d DKDLA  |d UKDOC  |d OCLCQ  |d TEFOD  |d OCLCQ  |d D6H  |d LOA  |d ICA  |d LVT  |d AGLDB  |d K6U  |d PIFAG  |d FVL  |d ZCU  |d MERUC  |d SAV  |d OCLCQ  |d JBG  |d U3W  |d OCLCF  |d STF  |d TAMCT  |d WRM  |d OCLCQ  |d VTS  |d LND  |d ICG  |d OCLCQ  |d OTZ  |d A6Q  |d LEAUB  |d DKC  |d OCLCQ  |d HS0  |d UKCRE  |d AJS  |d S2H  |d OCLCO  |d OCLCA 
049 |a TXMM 
050 4 |a U163  |b .S438 2013eb 
082 0 4 |a 355.4  |2 23 
100 1 |a Shakarian, Paulo. 
245 1 0 |a Introduction to cyber-warfare :  |b a multidisciplinary approach /  |c Paulo Shakarian, Jana Shakarian & Andrew Ruef. 
260 |a Amsterdam [Netherlands] :  |b Morgan Kaufmann Publishers, an imprint of Elsevier,  |c [2013] 
300 |a 1 online resource (xvii, 318 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
520 |a Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent. 
505 0 |a 1. Cyber Warfare: Here and Now -- What Is Cyber War? -- Is Cyber War a Credible Threat? -- Attribution, Deception, and Intelligence -- Information Assurance -- I. Cyber Attack -- 2. Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3. How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II. Cyber Espionage And Exploitation -- 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain -- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China -- Monitoring Dissidents: GhOstNet -- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network -- Cyber War Through Intellectual Property Theft: Operation Aurora -- An Example of the Current State of the Art: Sykipot -- Summary -- Suggested Further Reading -- 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation -- Introduction -- Kernel Mode Rootkits -- Vulnerabilities in the Operating System -- Stolen Keying Material -- Commonalities Between Stuxnet and Duqu -- Information-Stealing Trojans -- The Geography of Duqu -- TDL3 and Other Malware -- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss -- Summary -- Suggested Further Reading -- 9. Losing Trust in Your Friends: Social Network Exploitation -- Introduction -- Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks -- Designing Common Knowledge: Influencing a Social Network -- Summary -- Suggested Further Reading -- 10. How Iraqi Insurgents Watched U.S. Predator Video -- Information Theft on the Tactical Battlefield -- Introduction -- The Predator UAV -- Hacking the Predator Feed -- Summary -- Suggested Further Reading -- III. Cyber Operations For Infrastructure Attack -- 11. Cyber Warfare Against Industry -- Introduction -- Industrial Control Systems: Critical Infrastructure for Modern Nations -- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure -- Introduction -- Cyber Attacks Directed Against Power Grids -- Destroying a Generator with a Cyber Attack: The Aurora Test -- Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology -- Summary -- Suggested Further Reading -- 13. Attacking Iranian Nuclear Facilities: Stuxnet -- Introduction -- The Alleged Target: The Natanz Fuel Enrichment Facility -- How Stuxnet Targets Industrial Control Systems -- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant -- Stuxnet Is a Significant Advancement in Malware -- Stuxnet Invalidates Several Security Assumptions -- Implications for the Future -- Summary -- Suggested Further Reading -- Conclusion and the Future of Cyber-Warfare. 
546 |a English. 
590 |a EBSCO eBook Academic Comprehensive Collection North America 
650 0 |a Information warfare  |v Case studies. 
650 0 |a Cyberterrorism. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Computer crimes. 
650 0 |a Data protection. 
655 7 |a Case studies.  |2 fast  |0 (OCoLC)fst01423765 
655 7 |a Case studies.  |2 lcgft 
700 1 |a Shakarian, Jana. 
700 1 |a Ruef, Andrew. 
776 0 8 |i Print version:  |a Shakarian, Paulo.  |t Introduction to cyber-warfare.  |d Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013]  |z 9780124078147  |w (DLC) 2013014772  |w (OCoLC)843025546 
856 4 0 |u  |z CONNECT  |3 EBSCO  |t 0 
907 |a 4600972  |b 05-25-21  |c 06-30-20 
998 |a wi  |b 05-25-21  |c m  |d z   |e -  |f eng  |g ne   |h 0  |i 2 
994 |a 92  |b TXM 
999 f f |i 88f044ae-a49d-4f92-aaed-cd8fb1a2b008  |s 9638a8de-48ca-415c-808b-96925cd358c8  |t 0 
952 f f |t 1  |e U163 .S438 2013eb  |h Library of Congress classification 
856 4 0 |3 EBSCO  |t 0  |u  |z CONNECT