Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Introduction to cyber-warfare: a multidisciplinary approach
Bookmark Share

Text

Introduction to cyber-warfare: a multidisciplinary approach

Shakarian, Paulo - Personal Name; Shakarian, Jana - Personal Name; Ruef, Andrew - Personal Name;

Table of Contents

Chapter 1. Cyber Warfare: Here and Now
What Is Cyber War?
Is Cyber War a Credible Threat?
Attribution, Deception, and Intelligence
Information Assurance

I: Cyber Attack

Chapter 2. Political Cyber Attack Comes of Age in 2007
Information in this Chapter
Reliance on Information as a Vulnerability
Rudimentary but Effective: Denial of Service
Leaving Unwanted Messages: Web Site Defacement
Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack
Estonia Is Hit by Cyber Attacks
General Response to DDoS

Chapter 3. How Cyber Attacks Augmented Russian Military Operations
The 2008 Russian Cyber Campaign Against Georgia
What Is Interesting About the Russian Cyber Campaign
Preparing for a Cyber-Capable Adversary

Chapter 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East
Information in this Chapter
Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah “July War” of 2006
Civilians in the Cyber Melee: Operation Cast Lead

Chapter 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia
Information in This Chapter
DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks
Silencing Novaya Gazeta and Other Russian Dissidents
Iran—How the 2009 Elections Led to Aggressive Cyber Operations

Chapter 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates
Information in This Chapter
“Chaotic” Beginnings: The Chaos Computer Club, CCC
The Roots of the Anon—4chan, 7chan, and Other Message Boards
How We Are Influenced by 4chan: Memes
Anonymous—On Image, Structure, and Motivation
Anonymous—External Connections and Spin Offs
Your Security Is a Joke: LulzSec
Anonymous’ Modus Operandi
Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous
Software for the Legion: Anonymous Products


II: Cyber Espionage and Exploitation

Chapter 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy
Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine
Leveraging Resources Beyond the Military: The Cyber Warriors of China
Stealing Information from the U.S. Industrial-Military Complex: Titan Rain
Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China
Monitoring Dissidents: Gh0stNet
Using Legitimate Web Sites for Data Exfiltration: The Shadow Network
Cyber War Through Intellectual Property Theft: Operation Aurora
An Example of the Current State of the Art: Sykipot

Chapter 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation
Kernel Mode Rootkits
Vulnerabilities in the Operating System
Stolen Keying Material
Commonalities Between Stuxnet and Duqu
Information-Stealing Trojans
The Geography of Duqu
TDL3 and Other Malware
Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss

Chapter 9. Losing Trust in Your Friends: Social Network Exploitation
Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks
Designing Common Knowledge: Influencing a Social Network

Chapter 10. How Iraqi Insurgents Watched U.S. Predator Video—Information Theft on the Tactical Battlefield
The Predator UAV
Hacking the Predator Feed

III: Cyber Operations for Infrastructure Attack

Chapter 11. Cyber Warfare Against Industry
Industrial Control Systems: Critical Infrastructure for Modern Nations
Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply
How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology
How a Cyber Attack Led to Water Contamination: The Maroochy Water Breach

Chapter 12. Can Cyber Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure
Cyber Attacks Directed Against Power Grids
Destroying a Generator with a Cyber Attack: The Aurora Test
Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology

Chapter 13. Attacking Iranian Nuclear Facilities: Stuxnet
The Alleged Target: The Natanz Fuel Enrichment Facility
How Stuxnet Targets Industrial Control Systems
Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant
Stuxnet Is a Significant Advancement in Malware
Stuxnet Invalidates Several Security Assumptions
Implications for the Future

Conclusion and the Future of Cyber Warfare

Appendix I. Chapter 6: LulzSec Hacktivities

Appendix II. Chapter 6: Anonymous Timeline


Availability
#
Perpustakaan Poltek SSN (Rak 300) 355.4 SHA i
b0001335
Available - Available
Detail Information
Series Title
--
Call Number
355.4 SHA i
Publisher
Massachusetts : Syngress., 2013
Collation
xvii, 318 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9780124078147
Classification
355.4
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Cyberterrorism
Cyberspace -- Security measures
Information warfare
Specific Detail Info
--
Statement of Responsibility
Paulo Shakarian, et.al
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?