Cover image for Cyber warfare and cyber terrorism
Cyber warfare and cyber terrorism
Title:
Cyber warfare and cyber terrorism
Author:
Janczewski, Lech, 1943-
ISBN:
9781591409922
Publication Information:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007.
Physical Description:
electronic texts (xxx, 532 p. : ill.) : digital files.
Contents:
1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann --

21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / André Årnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir --

41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / André Årnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / Stéphane Coulondre -- 46. Cyber forensics / Stéphane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard.
Abstract:
This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.
Added Corporate Author:
Holds: Copies: