Introduction to Cyber-Warfare A Multidisciplinary Approach
Auteurs : Shakarian Paulo, Shakarian Jana, Ruef Andrew
Chapter 1 Introduction
Part I: Cyber Attack
Chapter 2 – Cyber Attack in an Inter-State Conflict
Chapter 3 – Cyber Attack in Conjunction with Conventional Military Operations :
Chapter 4 – Cyber Attack in Support of Information Operations:
Chapter 5 – Cyber Attack Against Internal Dissidents
Chapter 6 – Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 – Chinese Attributed Cyber Espionage
Chapter 8 – Hacking Unmanned Aerial Vehicles
Chapter 9 – Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 –Chapter 12 – Case Study
Part III
Chapter 11 – Industrial Control Systems
Chapter 12 – Cyber Attacks on the Power Grid
Chapter 13 – Stuxnet
Chapter 14- Conclusion and the Future of Cyber War
Information security professionals, system administrators. Security managers, security analysts. defense analysts, defense personnel, U.S Cybercom staff
Jana Shakarian is a Research Fellow at the West Point Network Science Center conducting sociological research in support of various DoD-sponsored projects. Previously, Jana has worked as a research assistant at Laboratory for Computational Cultural Dynamics at the University of Maryland where she extensively studied terrorist groups in south-east Asia in addition to other research initiatives at the intersection of social and computational science applied to military and security problems. She has written numerous papers in addition to co-authoring the book Computational Analysis of Terrorist Groups: Lashkar-e-Tabia, to be published by Springer in the near future. Jana holds an M.A. in cultural and social an
- Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play
- Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)
- Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec
- Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent
Date de parution : 08-2013
Ouvrage de 336 p.
19x23.4 cm
Thèmes d’Introduction to Cyber-Warfare :
Mots-clés :
(Distributed) Denial of service (D)DoS; 4chan/b; Anonymous; Attribution; Aurora; Aurora Test; Battlefield operating systems; Cascading attacks; Chaos Computer Club (CCC); China; Code-signing certificates theft; Conventional military operations; Cyber attack on electrical infrastructure; Cyber espionage; Cyber police; Cyber social movement; Cyber warfare; Cybercortical warfare; CYOP; DDoS; DNS; Duqu; Estonia; Facebook; Flame; Gauss; Gh0stNet; GII; Hacktivism; Hamas; Hezbollah; Industrial control systems; INEW; Information assurance; Information operations; Information theft; Information-stealing Trojans; IP address hijacking; Iran; Iranian Cyber Army; Israel; July war; Kata´ib Hezbollah; LulzSec; Malicious Security (MalSec); March of Millions; Maroochy Water Breach; Memes; Natanz; Natanz Fuel Enrichment Plant; NATO; NedaNet; Network science; Novaya Gazeta; Operation cast lead; Optima/darkness botnet; Peoples´ Liberation Front (PLF); PLA; PLC; Power grid; Predator; R3dhack; Robin Sage; Russia; SCADA; Shadow network; Smart grid; Social engineering; Social networks; SQL injection; Stuxnet; Sykipot; Syrian Electronic Army; T3amP0ison; TDL3; Three warfares; Tipping point; Titan rain; Unmanned aerial vehicles; Unrestricted warfare; Web site defacement; Wireless networks