LEADER 05649nam 2200709 a 450 001 996426339703316 005 20200520144314.0 010 $a0-12-407926-1 035 $a(CKB)2660000000011102 035 $a(EBL)1115159 035 $a(OCoLC)846492852 035 $a(SSID)ssj0000885464 035 $a(PQKBManifestationID)11536564 035 $a(PQKBTitleCode)TC0000885464 035 $a(PQKBWorkID)10953554 035 $a(PQKB)10088012 035 $a(MiAaPQ)EBC1115159 035 $a(CaSebORM)9780124078147 035 $a(Au-PeEL)EBL1115159 035 $a(CaPaEBR)ebr10704774 035 $a(CaONFJC)MIL492311 035 $a(EXLCZ)992660000000011102 100 $a20130429d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIntroduction to cyber-warfare$b[electronic resource] $ea multidisciplinary approach /$fPaulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia 205 $a1st edition 210 $aAmsterdam [Netherlands] $cMorgan Kaufmann Publishers, an imprint of Elsevier$d2013 215 $a1 online resource (256 p.) 300 $aDescription based upon print version of record. 311 $a0-12-407814-1 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service 327 $aThe Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ?s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary 327 $aCyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ? ? of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading 327 $aReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ? ?; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes 327 $aThe Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ? ? Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ? Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology 327 $aArab Spring 330 $aIntroduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.Provides a multi-disciplinary approach t 606 $aInformation warfare$vCase studies 606 $aCyberterrorism 606 $aCyberspace$xSecurity measures 606 $aComputer crimes 606 $aData protection 608 $aElectronic books. 615 0$aInformation warfare 615 0$aCyberterrorism. 615 0$aCyberspace$xSecurity measures. 615 0$aComputer crimes. 615 0$aData protection. 676 $a355.4 700 $aShakarian$b Paulo$0791399 701 $aShakarian$b Jana$0791400 701 $aRuef$b Andrew$0791401 801 0$bMiAaPQ 906 $aBOOK 912 $a996426339703316 996 $aIntroduction to cyber-warfare$91768809 997 $aUNISA