Cyberwarfare : threats to critical infrastructure / / Kristan Stoddart |
Autore | Stoddart Kristan |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (550 pages) |
Disciplina | 364.168 |
Collana | Palgrave studies in cybercrime and cybersecurity |
Soggetto topico |
Computer crimes - Prevention
Computer networks - Security measures Cyberspace operations (Military science) |
ISBN |
9783030972998
9783030972981 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Acknowledgments -- Contents -- Abbreviations and Concepts -- List of Figures -- 1 Introduction -- Cyberwar and Critical Infrastructure -- The Threat Actors -- The Cyber Context: States as Targets and Attackers -- Cybercriminals and Their Usefulness as 'Proxies' and 'Privateers' -- The Threat Landscape -- Machine Learning, Artificial Intelligence, and High Performance (Quantum) Computing -- Critical Infrastructure: ICS and SCADA -- Subdue the Enemy Without Fighting -- Cyber: The Fifth Domain of Warfare -- A Short Guide to Terminology -- Malware -- Cyber Forensics -- Overview -- Notes -- 2 On Cyberwar: Theorizing Cyberwarfare Through Attacks on Critical Infrastructure-Reality, Potential, and Debates -- Introduction -- The Fog of Cyberwar -- What Is Cyberwar(fare)? -- Cyberwar Deconstructed -- Hybrid Warfare -- International Law: JWT and the LOAC -- Rules of Engagement -- The Tallinn Manuals and the Cyberwarfare Debate -- Cyberwar Against Critical Infrastructure as a War Winner -- The Failure of Cyber Deterrence and the Attribution Problem -- Iran -- North Korea -- Policy and Debates in the United States -- The 2018 U.S. National Cyber Strategy: CISA and the Biden Administration -- The U.S. Military and 'Forward Defense' -- Conclusion -- Notes -- 3 Cyberwar: Attacking Critical Infrastructure -- Introduction -- SCADA Systems and Critical Infrastructure -- Proof-of-Concept: Aurora and Stuxnet -- The Implications of Aurora and Stuxnet -- Real-World Cases -- Electricity Generation and Distribution -- Electricity Producing Sites Include Nuclear Power Stations -- Water Treatment and Sanitation -- Dams and Reservoirs -- The Oil and Gas Industry: Rigs, Refineries, and Pipelines -- Chemical Plants -- Ports and Logistics -- Merchant Shipping -- Road and Rail -- Civil Aviation -- The Good News -- The Bad News -- Ukraine and Russia's 2022 Invasion.
Conclusion -- Notes -- 4 Gaining Access: Attack and Defense Methods and Legacy Systems -- Introduction -- Common Technical Attack Methods -- Drive-by Downloads -- Watering Hole Attacks -- Man-in-the-Middle/Session HIJACKING -- Zero-Days -- Rootkits -- Remote Access Trojans (RATs) -- The Use of Mobile/Cellular Devices and Remote Access -- Script Kiddies or Nation-States? -- Common TTPs -- Counters and Defenses -- Firewalls -- Demilitarized Zones (DMZs) -- Intrusion Detection Systems (IDS): HIDS/SIDS/HIPS -- Honeypots and Honeytraps -- Signature and Behavior-Based Malware Detection -- Sandboxing -- Packet Sniffers -- Application Whitelisting -- Security Information and Event Management -- Blockchain -- Pressing the Reset -- The Zero Trust Security Model -- Legacy Systems: In-Built Vulnerabilities in Critical Infrastructure -- Legacy Systems of the U.S. Government -- Industry and the Costs of 'Keeping the Lights On' -- Patching -- Targeting Supply Chains -- Conclusion -- Notes -- 5 Hacking the Human -- Introduction -- Social Engineering -- Examples of Social Engineering -- Exploiting Cognitive and Behavioral Psychology -- Hacking the Human -- Spear Phishing -- Mitigating Spear Phishing -- Spear Phishing Attack Tools and Websites -- State Intelligence: HUMINT Beyond Social Engineering -- The 'Birds Eye' Macro View and the Micro Level of HUMINT -- Human Sources and Human Agency -- Cyber Defense and Offense -- Defending Insider Threats -- Mitigation and the Insider Threat -- Physical Security I -- Physical Security II: The CIA Triad and 'Full Disclosure' -- The Cybersecurity Workforce Deficit -- Computer Emergency Response Teams -- Cyber Threat Intelligence and the Cybersecurity Community -- Industry and Government Backed Self-Help Groups -- Conclusion -- Notes -- 6 Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers -- Introduction. Outsider Threats, Insider Threats, and Target Spotting -- Hackers, Hacking Groups, and Social Engineering -- Social Network Analysis -- SNA as a Law Enforcement and Intelligence Tool -- Terrorism -- Encryption and the Risk of 'Going Dark' -- State-Backed/State-Sanctioned Cybercrime -- Cybercriminals and States -- 'Dark Net' Markets -- Organized Crime, Ransomware, and the 'Dark Net' -- WannaCry and Petya/NotPetya -- The Cloak of Attribution: The Use of Proxy Actors by States -- Conclusion -- Notes -- 7 Conclusion -- On Cyberwarfare -- Attacking Critical Infrastructure -- Pinprick Attacks and First Strike -- Cybersecurity Defenses: Risk Management and Legacy Systems -- Hacking the Human -- Reducing Risk -- Risk Management and Resilience -- States as Advanced Persistent Threats -- The U.S. Intelligence Community and a 'Whole of Nation' Effort -- Zugzwang -- Notes -- Bibliography -- Index. |
Record Nr. | UNINA-9910631082803321 |
Stoddart Kristan | ||
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyberwarfare : threats to critical infrastructure / / Kristan Stoddart |
Autore | Stoddart Kristan |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (550 pages) |
Disciplina | 364.168 |
Collana | Palgrave studies in cybercrime and cybersecurity |
Soggetto topico |
Computer crimes - Prevention
Computer networks - Security measures Cyberspace operations (Military science) |
ISBN |
9783030972998
9783030972981 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Acknowledgments -- Contents -- Abbreviations and Concepts -- List of Figures -- 1 Introduction -- Cyberwar and Critical Infrastructure -- The Threat Actors -- The Cyber Context: States as Targets and Attackers -- Cybercriminals and Their Usefulness as 'Proxies' and 'Privateers' -- The Threat Landscape -- Machine Learning, Artificial Intelligence, and High Performance (Quantum) Computing -- Critical Infrastructure: ICS and SCADA -- Subdue the Enemy Without Fighting -- Cyber: The Fifth Domain of Warfare -- A Short Guide to Terminology -- Malware -- Cyber Forensics -- Overview -- Notes -- 2 On Cyberwar: Theorizing Cyberwarfare Through Attacks on Critical Infrastructure-Reality, Potential, and Debates -- Introduction -- The Fog of Cyberwar -- What Is Cyberwar(fare)? -- Cyberwar Deconstructed -- Hybrid Warfare -- International Law: JWT and the LOAC -- Rules of Engagement -- The Tallinn Manuals and the Cyberwarfare Debate -- Cyberwar Against Critical Infrastructure as a War Winner -- The Failure of Cyber Deterrence and the Attribution Problem -- Iran -- North Korea -- Policy and Debates in the United States -- The 2018 U.S. National Cyber Strategy: CISA and the Biden Administration -- The U.S. Military and 'Forward Defense' -- Conclusion -- Notes -- 3 Cyberwar: Attacking Critical Infrastructure -- Introduction -- SCADA Systems and Critical Infrastructure -- Proof-of-Concept: Aurora and Stuxnet -- The Implications of Aurora and Stuxnet -- Real-World Cases -- Electricity Generation and Distribution -- Electricity Producing Sites Include Nuclear Power Stations -- Water Treatment and Sanitation -- Dams and Reservoirs -- The Oil and Gas Industry: Rigs, Refineries, and Pipelines -- Chemical Plants -- Ports and Logistics -- Merchant Shipping -- Road and Rail -- Civil Aviation -- The Good News -- The Bad News -- Ukraine and Russia's 2022 Invasion.
Conclusion -- Notes -- 4 Gaining Access: Attack and Defense Methods and Legacy Systems -- Introduction -- Common Technical Attack Methods -- Drive-by Downloads -- Watering Hole Attacks -- Man-in-the-Middle/Session HIJACKING -- Zero-Days -- Rootkits -- Remote Access Trojans (RATs) -- The Use of Mobile/Cellular Devices and Remote Access -- Script Kiddies or Nation-States? -- Common TTPs -- Counters and Defenses -- Firewalls -- Demilitarized Zones (DMZs) -- Intrusion Detection Systems (IDS): HIDS/SIDS/HIPS -- Honeypots and Honeytraps -- Signature and Behavior-Based Malware Detection -- Sandboxing -- Packet Sniffers -- Application Whitelisting -- Security Information and Event Management -- Blockchain -- Pressing the Reset -- The Zero Trust Security Model -- Legacy Systems: In-Built Vulnerabilities in Critical Infrastructure -- Legacy Systems of the U.S. Government -- Industry and the Costs of 'Keeping the Lights On' -- Patching -- Targeting Supply Chains -- Conclusion -- Notes -- 5 Hacking the Human -- Introduction -- Social Engineering -- Examples of Social Engineering -- Exploiting Cognitive and Behavioral Psychology -- Hacking the Human -- Spear Phishing -- Mitigating Spear Phishing -- Spear Phishing Attack Tools and Websites -- State Intelligence: HUMINT Beyond Social Engineering -- The 'Birds Eye' Macro View and the Micro Level of HUMINT -- Human Sources and Human Agency -- Cyber Defense and Offense -- Defending Insider Threats -- Mitigation and the Insider Threat -- Physical Security I -- Physical Security II: The CIA Triad and 'Full Disclosure' -- The Cybersecurity Workforce Deficit -- Computer Emergency Response Teams -- Cyber Threat Intelligence and the Cybersecurity Community -- Industry and Government Backed Self-Help Groups -- Conclusion -- Notes -- 6 Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers -- Introduction. Outsider Threats, Insider Threats, and Target Spotting -- Hackers, Hacking Groups, and Social Engineering -- Social Network Analysis -- SNA as a Law Enforcement and Intelligence Tool -- Terrorism -- Encryption and the Risk of 'Going Dark' -- State-Backed/State-Sanctioned Cybercrime -- Cybercriminals and States -- 'Dark Net' Markets -- Organized Crime, Ransomware, and the 'Dark Net' -- WannaCry and Petya/NotPetya -- The Cloak of Attribution: The Use of Proxy Actors by States -- Conclusion -- Notes -- 7 Conclusion -- On Cyberwarfare -- Attacking Critical Infrastructure -- Pinprick Attacks and First Strike -- Cybersecurity Defenses: Risk Management and Legacy Systems -- Hacking the Human -- Reducing Risk -- Risk Management and Resilience -- States as Advanced Persistent Threats -- The U.S. Intelligence Community and a 'Whole of Nation' Effort -- Zugzwang -- Notes -- Bibliography -- Index. |
Record Nr. | UNISA-996499855403316 |
Stoddart Kristan | ||
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Facing Down the Soviet Union : Britain, the USA, NATO and Nuclear Weapons, 1976-1983 / / by Kristan Stoddart |
Autore | Stoddart Kristan |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2014 |
Descrizione fisica | 1 online resource (337 p.) |
Disciplina | 355.02/170941 |
Soggetto topico |
Politics and war
Great Britain—History Military history World politics Political science History, Modern Military and Defence Studies History of Britain and Ireland History of Military Political History Political Science Modern History |
ISBN |
1-349-49443-7
1-137-44032-5 1-137-44033-3 |
Classificazione | HIS015000HIS027030HIS027110HIS032000HIS037070 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Half-Title; Title; Copyright; Contents; Acknowledgements; List of Abbreviations; Introduction; 1 The British Labour Government and the Development of Chevaline, 1976-1979; 2 The Callaghan Government and Polaris Replacement 1976-1979: The Duff-Mason Report; 3 Britain, the US and NATO LRTNF Modernisation, 1976-1979; 4 'Gone Bananas' - The Conservative Government and Chevaline, 1979-1983; 5 Mrs Thatcher and the Trident C-4 Decision; 6 Follow-on Negotiations for Trident C-4; 7 Mrs Thatcher, MISC 7 and the Trident II D-5 Decision
8 Creating the 'Seamless Robe of Deterrence': Great Britain's Role in NATO's INF DebateConclusion; Notes; Bibliography; Index |
Record Nr. | UNINA-9910156231103321 |
Stoddart Kristan | ||
London : , : Palgrave Macmillan UK : , : Imprint : Palgrave Macmillan, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|