Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : Shakarian, Paulo
Titre(s) : Introduction to cyber-warfare [Texte électronique] : a multidisciplinary approach / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Publication : Amsterdam ; Boston : Syngress, [2013]
Description matérielle : 1 ressource dématérialisée
Note(s) : Includes bibliographical references and index
Cyber Warfare has become a global problem threatening governments, corporations and
individuals. This new domain of warfare is not only inhabited by governments such
as China, Russia, Iran, and the United States, but a variety of other actors including
insurgent groups like Hezbollah and Hamas as well as hacking groups such as Anonymous,
LulzSec, and others. According to a recent analysis the global market for Cyber Warfare
consulting, product development and protective services will reach a value of $15.9
billion in 2012. This in-depth text on cyber warfare, written by experts on the front
lines, explores the cutting edge world of cyber-warfare including the following: Provides
a multi-disciplinary approach to Cyber Warfare analyzing the information technology,
military, policy, social, and scientific issues that are in play, Presents detailed
case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia),
cyber-attack as an element of an information operations strategy (Israel-Hezbollah,)
cyber-attack as a tool against dissidents within a state (Russia, Iran); cyber-attack
conducted by large, powerful, non-state hacking organizations such as Anonymous and
LulzSec, and attacks directed against infrastructure such including water treatment
plants, the power-grid and a detailed account on the Stuxent worm, Explores acts of
cyber-warfare against industry including those against Aramco, Google, and others
as well as the state-of-the-art in intelligence-gathering malware platforms including
Duqu, Flame, and Gauss as well as how social media such as Facebook and Linkedln are
also leveraged for this purpose
Autre(s) auteur(s) : Shakarian, Jana. Fonction indéterminée
Ruef, Andrew. Fonction indéterminée
Sujet(s) : Guerre de l'information
Cyberterrorisme
Cyberespace -- Mesures de sûreté
Cybercriminalité
Protection de l'information (informatique)
Cyber-espionnage
Terrorisme
Genre ou forme : Études de cas
Indice(s) Dewey :
355.4 (23e éd.) = Opérations militaires
Identifiants, prix et caractéristiques : ISBN 9780124078147
Identifiant de la notice : ark:/12148/cb44635982j
Notice n° :
FRBNF44635982
(notice reprise d'un réservoir extérieur)
Table des matières : Preface -- ; Foreword -- ; Introduction -- ; Biography --1 ; Cyber Warfare: Here and
Now -- ; What Is Cyber War? -- ; Is Cyber War a Credible Threat? -- ; Attribution,
Deception, and Intelligence -- ; Information Assurance --I ; Cyber Attack --2 ; Political
Cyber Attack Comes of Age in 2007 -- ; Reliance on Information as a Vulnerability
-- ; Rudimentary but Effective: Denial of Service -- ; Leaving Unwanted Messages:
Web Site Defacement -- ; Tools for Denial of Service -- ; The Difficulty of Assigning
Blame: Why Attribution Is Tough in a DDoS Attack -- ; Estonia Is Hit by Cyber Attacks
-- ; General Response to DDoS -- ; Summary -- ; Suggested Further Reading --3 ; How
Cyber Attacks Augmented Russian Military Operations -- ; The 2008 Russian Cyber Campaign
Against Georgia -- ; What Is Interesting About the Russian Cyber Campaign -- ; Preparing
for a Cyber-Capable Adversary -- ; Suggested Further Reading --4 ; When Who Tells
the Best Story Wins: Cyber and Information Operations in the Middle Eas