Chinese cybersecurity and defense / / edited by Daniel Ventre
| Chinese cybersecurity and defense / / edited by Daniel Ventre |
| Pubbl/distr/stampa | London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (321 p.) |
| Disciplina | 005.8 |
| Collana | ISTE |
| Soggetto topico |
Computer security
Internet - Security measures |
| ISBN |
1-119-00900-6
1-119-00901-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cyber security - Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development,China's Internet has been closely linked to the Chinese economy, and was programmed and integrated into its macro economic development blueprints
1.3.2. In addition to lending full policy support to Internet development, China also invests heavily in building Internet infrastructures 1.3.3. The Chinese government actively promotes the R&D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyber affairs in line with law, adhering to the principles of scientific and effective administration in its Internet governance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internet administration in China; 1.4.1.1. Laws and regulations on Internet administration 1.4.1.2. The leading role of the Chinese government in Internet administration 1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow of information in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security 1.5. Cyber security and diplomacy: an international perspective 1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cyber crimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cyber security strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations 2.1. The evolution of Chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions 2.4. Key types of information operations |
| Record Nr. | UNINA-9910132157603321 |
| London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Chinese cybersecurity and defense / / edited by Daniel Ventre
| Chinese cybersecurity and defense / / edited by Daniel Ventre |
| Pubbl/distr/stampa | London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (321 p.) |
| Disciplina | 005.8 |
| Collana | ISTE |
| Soggetto topico |
Computer security
Internet - Security measures |
| ISBN |
1-119-00900-6
1-119-00901-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Author Biographies; Introduction; Chapter 1: China's Internet Development and Cyber security - Policies and Practices; 1.1. Introduction; 1.2. Internet development in China: an overview; 1.3. China's policies towards Internet development; 1.3.1. From the very beginning of its development,China's Internet has been closely linked to the Chinese economy, and was programmed and integrated into its macro economic development blueprints
1.3.2. In addition to lending full policy support to Internet development, China also invests heavily in building Internet infrastructures 1.3.3. The Chinese government actively promotes the R&D of next-generation Internet (NGI); 1.3.4. China practices a policy of managing cyber affairs in line with law, adhering to the principles of scientific and effective administration in its Internet governance; 1.4. Cyber legislation and Internet administration; 1.4.1. Basic principles and practices of Internet administration in China; 1.4.1.1. Laws and regulations on Internet administration 1.4.1.2. The leading role of the Chinese government in Internet administration 1.4.1.3. Industry self-regulation; 1.4.1.4. Public supervision through special websites; 1.4.2. Guaranteeing the free and secure flow of information in cyberspace; 1.4.2.1. Guaranteeing Citizens' Freedom of Speech on the Internet; 1.4.2.1.1. Constitutional guarantee; 1.4.2.1.2. Public supervision via the Internet; 1.4.2.1.3. CCDI website for public supervision; 1.4.2.1.4. Protecting citizens' online privacy; 1.4.2.1.5. Guaranteeing online safety for minors; 1.4.2.2. Protecting Internet Security 1.5. Cyber security and diplomacy: an international perspective 1.5.1. Cyber policy dialogue and consultation; 1.5.2. Regional cyber cooperation; 1.5.3. Track II cyber diplomacy; 1.5.4. Legal cooperation in combating cyber crimes; 1.5.5. Technical cooperation; 1.5.5.1. CNCERT; 1.5.5.2. CNNIC; 1.5.5.3. ISC; 1.5.6. Office for Cyber Affairs of the MFA; 1.6. A cyber security strategy in the making?; 1.6.1. Significance of the Internet for China; 1.6.2. Goals and objectives; 1.6.3. Cyber threat landscape; 1.6.4. Means for strategic goals; 1.7. Conclusion Chapter 2: PLA Views on Informationized Warfare, Information Warfare and Information Operations 2.1. The evolution of Chinese military thinking; 2.2. The growing importance of information; 2.3. Information operations; 2.3.1. Command and control missions; 2.3.2. Offensive information missions; 2.3.2.1. Information coercion/information deterrence; 2.3.2.2. Information blockade; 2.3.2.3. Information misdirection; 2.3.2.4. Information contamination; 2.3.2.5. Information paralysis; 2.3.3. Defensive information missions; 2.3.4. Information support and safeguarding missions 2.4. Key types of information operations |
| Record Nr. | UNINA-9910815351103321 |
| London, [England] ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre
| Cyber conflict [[electronic resource] ] : competing national perspectives / / edited by Daniel Ventre |
| Autore | Ventre Daniel |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, : Iste |
| Descrizione fisica | 1 online resource (345 p.) |
| Disciplina | 363.325/6004678 |
| Altri autori (Persone) | VentreDaniel |
| Collana | ISTE |
| Soggetto topico |
Internet - Security measures
Cyberspace - Security measures Computer networks - Security measures |
| ISBN |
1-118-56266-6
1-118-56274-7 1-118-56296-8 1-299-18890-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions 2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled 3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing 4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy |
| Record Nr. | UNINA-9910138856703321 |
Ventre Daniel
|
||
| London, : Iste | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber conflict : competing national perspectives / / edited by Daniel Ventre
| Cyber conflict : competing national perspectives / / edited by Daniel Ventre |
| Autore | Ventre Daniel |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, : Iste |
| Descrizione fisica | 1 online resource (345 p.) |
| Disciplina | 363.325/6004678 |
| Altri autori (Persone) | VentreDaniel |
| Collana | ISTE |
| Soggetto topico |
Internet - Security measures
Cyberspace - Security measures Computer networks - Security measures |
| ISBN |
9781118562666
1118562666 9781118562741 1118562747 9781118562963 1118562968 9781299188907 1299188907 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy; 1.1. Introduction; 1.2. Canada in North America: sovereign but subordinate?; 1.3. Counter-terrorism for the improvement of national security; 1.4. The long path to a national CI protection strategy and nationalcyber security strategy; 1.5. The adoption of the current strategies for CI protection and cyber security; 1.6. Conclusion; 1.7. Bibliography; 1.7.1. Scientific and media articles; 1.7.2. Primary Data; 1.7.3. Websites
Chapter 2. Cuba: Towards an Active Cyber-defense2.1. Cyberspace: statistics and history; 2.1.1. The marginalization of Cuba; 2.1.2. Cuban cyberspace as the target of attacks; 2.2. Theoretical and practical considerations on information warfareand cyber-warfare; 2.2.1. Development of capabilities; 2.3. Cyber-warfare theories and practices; 2.3.1. Fidel Castro's discourse; 2.3.2. The concept of active cyber-defense; 2.4. Regulations and ways around them; 2.4.1. The State's influence over cyberspace; 2.4.2. Getting around the restrictions 2.5. Capabilities of control, surveillance and interception2.6. Enemies; 2.7. Conclusion; 2.8. Bibliography; Chapter 3. French Perspectives on Cyber-conflict; 3.1. Cyberspace; 3.2. Assessments, view on the world and awakening; 3.2.1. Attacks; 3.2.2. The feeling of insecurity, the threat; 3.2.3. Potential vulnerabilities of States; 3.2.4. Evolution of the international environment; 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines; 3.3.1. Information: a powerful weapon for those controlling it; 3.3.2. Media information: beneficial if controlled 3.3.3. Economic information as power, if controlled3.3.4. Information warfare; 3.3.5. Information warfare or information control; 3.3.6. The ANSSI; 3.3.7. Cyber-security and cyber-defense; 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development; 3.3.9. Cyber-war and other modalities of the cyber-conflict; 3.4. Conclusion; 3.5. Bibliography; Chapter 4. Digital Sparta: Information Operationsand Cyber-warfare in Greece; 4.1. Geopolitical significance; 4.2. Strategic concerns and internal balancing 4.3. Formative experiences in information operations: the Ergenekon conspiracy4.4. Formative experiences in information operations:intensifying cyber-attacks; 4.5. Formative experiences in information operations: the Öcalan affair; 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005; 4.7. Emerging civilian information operations strategies; 4.8. Emerging military information operations strategies; 4.9. The European Union dimension in Greek information operations; 4.10. Conclusion; 4.11. Bibliography Chapter 5. Moving Toward an Italian Cyber Defenseand Security Strategy |
| Record Nr. | UNINA-9910820094103321 |
Ventre Daniel
|
||
| London, : Iste | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybercrime during the SARS-Cov-2 pandemic (2019-2022) : evolutions, adaptations, consequences / / edited by Daniel Ventre, Hugo Loiseau
| Cybercrime during the SARS-Cov-2 pandemic (2019-2022) : evolutions, adaptations, consequences / / edited by Daniel Ventre, Hugo Loiseau |
| Pubbl/distr/stampa | London, England : , : ISTE Ltd and John Wiley & Sons, Inc., , [2023] |
| Descrizione fisica | 1 online resource (256 pages) |
| Disciplina | 345.730268 |
| Soggetto topico |
Computer crimes
Computer viruses Criminal jurisdiction |
| ISBN |
1-394-22634-9
1-394-22632-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1. The Evolution of Cybercrime During the Covid-19 Crisis -- 1.1. Introduction -- 1.2. Observing the evolution of cybercrime -- 1.2.1. Leveraging annual data: the case of India -- 1.2.2. Leveraging monthly data -- 1.2.3. Leveraging weekly data: the case of China -- 1.3. Has the global geography of cyberattacks changed? -- 1.4. Conclusion -- 1.5. Appendix -- 1.5.1. Cybercrime tools: malware -- 1.5.2. CVSS as indicators of vulnerability levels -- 1.5.3. Heterogeneity and complexity of cybercrime typologies -- 1.5.4. Attitude of companies toward cyber risks: the case of the United Kingdom -- 1.6. References -- Chapter 2. The SARS-CoV-2 Pandemic Crisis and the Evolution of Cybercrime in the United States and Canada -- 2.1. Introduction -- 2.2. The impacts of the SARS-CoV-2 pandemic -- 2.3. Cybercrime and SARS-CoV-2 -- 2.3.1. Targets and victims -- 2.3.2. Malicious actors -- 2.3.3. Cyberspace: a propitious environment for cybercrime -- 2.4. The evolution of cybercrime in North America during the pandemic -- 2.4.1. The United States -- 2.4.2. Canada -- 2.5. Discussion -- 2.6. Conclusion -- 2.7. Acknowledgments -- 2.8. References -- Chapter 3. Online Radicalization as Cybercrime: American Militancy During Covid-19 -- 3.1. Introduction -- 3.2. A new typology of cybercrime -- 3.3. Internet connectivity and violent militancy -- 3.4. The pre-pandemic domestic threat landscape -- 3.5. The domestic threat landscape of the pandemic -- 3.6. Pandemic accelerationism -- 3.7. From virtual to real-life criminality -- 3.8. Online radicalization during Covid-19 -- 3.9. A new methodological paradigm for online radicalization? -- 3.10. Conclusion: meta-radicalization as cybercrime -- 3.11. References.
Chapter 4. Cybercrime in Brazil After the Covid-19 Global Crisis: An Assessment of the Policies Concerning International Cooperation for Investigations and Prosecutions -- 4.1. Introduction: Brazilian cybercrime and the Covid crisis impact -- 4.2. Cybercrime in the literature and the Brazilian case -- 4.3. A theoretical model for international cooperation -- 4.4. The evolution of cybercrime in Brazil -- 4.5. The evolution of the Brazilian legal system concerning cybercrime and its connection to the international regime -- 4.6. Managing international cooperation without having the best tools -- 4.7. Difficulties with cooperation: joints, mortises, and notches -- 4.8. Conclusion: what to expect from the future? -- 4.9. References -- 4.10. Appendix: List of interviews and questions -- Chapter 5. Has Covid-19 Changed Fear and Victimization of Online Identity Theft in Portugal? -- 5.1. Introduction -- 5.2. The impact of the Covid-19 pandemic on cybercrime -- 5.3. Evolution of cybercrime in Portugal -- 5.4. Online identity theft (OIT) -- 5.4.1. Definition and modus operandi -- 5.4.2. RAT applied to cyberspace -- 5.4.3. Individual variables and OIT victimization -- 5.5. Fear of (online) crime -- 5.5.1. Determinants of fear of (online) crime -- 5.6. The present study -- 5.6.1. Measures -- 5.6.2. Results -- 5.6.3. Variables associated with online victimization and fear of identity theft -- 5.7. Conclusion -- 5.8. References -- Chapter 6. A South African Perspective on Cybercrime During the Pandemic -- 6.1. Introduction -- 6.1.1. Background to South Africa and the pandemic -- 6.1.2. Methodology -- 6.2. International rankings -- 6.3. Cybercrime and related legislation -- 6.4. Cybersecurity incidents -- 6.4.1. Ransomware -- 6.4.2. Scams and fraud -- 6.4.3. System intrusions and data breaches -- 6.4.4. Disinformation and malicious communications -- 6.4.5. Other. 6.5. Discussion -- 6.6. Conclusion -- 6.7. References -- List of Authors -- Index -- EULA. |
| Record Nr. | UNINA-9910830147403321 |
| London, England : , : ISTE Ltd and John Wiley & Sons, Inc., , [2023] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybersecurity in humanities and social sciences : a research methods approach / / edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden
| Cybersecurity in humanities and social sciences : a research methods approach / / edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden |
| Pubbl/distr/stampa | London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , [2020] |
| Descrizione fisica | 1 online resource (241 pages) |
| Disciplina | 005.8 |
| Soggetto topico | Computer security - Research |
| ISBN |
1-119-77757-7
1-119-77758-5 1-119-77756-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910555266903321 |
| London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , [2020] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cybersecurity in humanities and social sciences : a research methods approach / / edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden
| Cybersecurity in humanities and social sciences : a research methods approach / / edited by Hugo Loiseau, Daniel Ventre, Hartmut Aden |
| Pubbl/distr/stampa | London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , [2020] |
| Descrizione fisica | 1 online resource (241 pages) |
| Disciplina | 005.8 |
| Soggetto topico | Computer security - Research |
| ISBN |
1-119-77757-7
1-119-77758-5 1-119-77756-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910816707003321 |
| London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , [2020] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
| Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre |
| Autore | Ventre Daniel |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, : ISTE |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina |
355.3/43
355.343 |
| Altri autori (Persone) | VentreDaniel |
| Collana | ISTE |
| Soggetto topico |
Information warfare
Psychological warfare Computer crimes |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-118-60348-6
1-299-18789-7 1-118-60339-7 1-118-60351-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography Chapter 6. Riots in Xinjiang and Chinese Information Warfare |
| Record Nr. | UNINA-9910141487803321 |
Ventre Daniel
|
||
| London, : ISTE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre
| Cyberwar and information warfare [[electronic resource] /] / edited by Daniel Ventre |
| Autore | Ventre Daniel |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, : ISTE |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina |
355.3/43
355.343 |
| Altri autori (Persone) | VentreDaniel |
| Collana | ISTE |
| Soggetto topico |
Information warfare
Psychological warfare Computer crimes |
| ISBN |
1-118-60348-6
1-299-18789-7 1-118-60339-7 1-118-60351-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography Chapter 6. Riots in Xinjiang and Chinese Information Warfare |
| Record Nr. | UNINA-9910830507403321 |
Ventre Daniel
|
||
| London, : ISTE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyberwar and information warfare / / edited by Daniel Ventre
| Cyberwar and information warfare / / edited by Daniel Ventre |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, : ISTE |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina | 355.3/43 |
| Altri autori (Persone) | VentreDaniel |
| Collana | ISTE |
| Soggetto topico |
Information warfare
Psychological warfare Computer crimes |
| ISBN |
9781118603482
1118603486 9781299187894 1299187897 9781118603390 1118603397 9781118603512 1118603516 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Cyberwar and Information Warfare; Title Page; Copyright Page; Table of Contents; Introduction; List of Acronyms; Chapter 1. Cyberwar and its Borders; 1.1. The seduction of cyberwar; 1.2. Desirable, vulnerable and frightening information; 1.3. Conflict and its dimensions; 1.4. The Helm and space; 1.5. Between knowledge and violence; 1.6. Space, distance and paths; 1.7. The permanency of war; 1.8. No war without borders; 1.9. The enemy and the sovereign; 1.10. Strengths and weaknesses; 1.11. Bibliography; Chapter 2. War of Meaning, Cyberwar and Democracies; 2.1. Introduction
2.2. Informational environment, a new operating space for strategy2.2.1. War and information: stakes for the West; 2.2.2. Strategy in the information environment; 2.2.3. Winning the battle of legitimacies; 2.3. Influence strategy: defeating and limiting armed force physical involvement; 2.3.1. Describing the aggressor; 2.3.2. Armed forces and the information environment; 2.3.3. The need for moral force; 2.4. Conclusion; 2.5. Bibliography; Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise; 3.1. Information warfare, information and war 3.2. Intelligence and strategic surprise3.2.1. Strategic surprise; 3.2.2. Perception of surprise; 3.2.3. Perception of the possibility of surprise; 3.3. Strategic surprise and information warfare; 3.4. Concluding remarks: surprise in strategic studies; 3.5. Bibliography; Chapter 4. Cyberconflict: Stakes of Power; 4.1. Stakes of power; 4.1.1. Power relations; 4.1.2. Expression of sovereignty; 4.1.3. Cyberpower; 4.1.4. Measuring and locating power; 4.1.5. Limits of exercising power; 4.1.6. The Monroe doctrine; 4.1.7. Globalization; 4.1.8. Shock theories; 4.1.9. Naval and maritime power strategy 4.1.10. Air/space and cybernetic power: analogies4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons; 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons; 4.1.13. Cyberconflict and new wars; 4.2. The Stuxnet affair; 4.3. Bibliography; Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct; 5.1. Introduction; 5.2. Towards a broader concept of cyberwar; 5.2.1. War and cyberwar: common ground; 5.2.2. New orders in cyberwar; 5.2.3. Who are cyberwarriors?; 5.2.4. Is formalization possible? 5.3. Concept of critical infrastructure5.3.1. Generalized definition of the notion of critical infrastructure; 5.3.2. System interdependence; 5.4. Different phases of a cyberattack; 5.4.1. Intelligence phase; 5.4.2. Planning phase; 5.4.3. Conduct phase; 5.5. A few "elementary building blocks"; 5.5.1. General tactical framework; 5.5.2. Attacks on people; 5.5.3. Opinion manipulation and area control; 5.5.4. Military computer attack in a conventional operation; 5.6. Example scenario; 5.6.1. Tactical scenario; 5.6.2. The order of events; 5.6.3. Analysis; 5.7. Conclusion; 5.8. Bibliography Chapter 6. Riots in Xinjiang and Chinese Information Warfare |
| Record Nr. | UNINA-9911019820603321 |
| London, : ISTE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||