رکورد قبلیرکورد بعدی

" Cyber weaponry : "


Document Type : BL
Record Number : 864596
Title & Author : Cyber weaponry : : issues and implications of digital arms /\ Henry Prunckun, editor.
Publication Statement : Cham, Switzerland :: Springer,, [2018]
: , ©2018
Series Statement : Advanced sciences and technologies for security applications
Page. NO : 1 online resource :: illustrations
ISBN : 3319741071
: : 9783319741079
: 3319741063
: 9783319741062
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Intro; Dedication; Foreword; Preface; About the Study Questions; Acknowledgment; Contents; Chapter 1: Weaponization of Computers; 1.1 Weaponization; 1.2 Weaponizing Computers; 1.3 How Is Weaponizing Done?; 1.4 Who Does It?; 1.5 Implications for Policy and Practice; 1.5.1 Legislative Control; 1.5.2 Malware Marketplaces; 1.5.3 Need for Self-Defence; 1.5.4 Personal Privacy; 1.5.5 Dual-Purpose Weapons; 1.5.6 Business Sector and Non-government Organizations; 1.5.7 Cyber War; 1.5.8 Stateś Obligation to Citizen Protection; 1.5.9 Use in Disrupting Drug Trafficking; 1.5.10 Cyber Counterintelligence
: 1.6 Cyber-Security Myth1.7 Principal Concepts; 1.8 Study Questions; 1.9 Learning Activity; Reference; Chapter 2: Human Nature and Cyber Weaponry: Use of Denial and Deception in Cyber Counterintelligence; 2.1 Background; 2.2 The Cyber Espionage Threat; 2.3 Counterintelligence Definitions, Status, and Frameworks; 2.4 Cyber Counterintelligence Framework in Active Cyber Defense; 2.5 Cyber Denial and Deception Techniques and Technologies to Enhance Cyber Counterintelligence in Active Cyber Defense; 2.6 Hypothetical Case Study; 2.7 Conclusion; 2.8 Principal Concepts; 2.9 Study Questions
: 2.10 Learning ActivitiesReferences; Chapter 3: The Human Element: The ``Trigger ́́on Cyber Weapons; 3.1 Introduction; 3.2 Rationale; 3.3 Who; 3.4 How; 3.4.1 Attack Vectors; 3.5 Why; 3.5.1 Identify Vital Information Assets; 3.5.2 Assess Your Vital Information Assets ́Vulnerability; 3.5.3 Vital Information; 3.5.3.1 Basics; 3.5.3.2 IT Infrastructure; 3.5.3.3 Internet of Things; 3.5.3.4 Public Networks and Social Media; 3.5.4 Reinforce Basic Protections; 3.5.5 Improve Awareness; 3.5.6 Act, But Do Not Over React; 3.6 Best Practice; 3.7 Conclusion; 3.8 Principal Concepts; 3.9 Study Questions
: 3.10 Learning ActivityReferences; Chapter 4: Cyber Defense for IMGs and NGOs Using Crime Prevention Through Environmental Design; 4.1 Background; 4.2 Introduction; 4.3 Role of Social Media in Protest; 4.4 Background to CPTED; 4.5 Developing a Cyber Defence Plan; 4.5.1 Creating the Network; 4.5.2 Gathering Information; 4.5.3 Sending Information; 4.6 Using CPTED; 4.6.1 Surveillance; 4.6.2 Legibility; 4.6.3 Territoriality; 4.6.4 Ownership of the Space; 4.6.5 Management of the Space; 4.6.6 Vulnerability; 4.7 Agent Provocateur; 4.8 Conclusion; 4.9 Principal Concepts; 4.10 Study Questions
: 4.11 Learning ActivityReferences; Chapter 5: Drinking from a Fire Hydrant: Information Overload As a Cyber Weapon; 5.1 Introduction; 5.2 Cyber War; 5.3 Fog of War; 5.4 Typology; 5.5 X Axis; 5.6 Y Axis; 5.7 Z Axis; 5.8 Conclusion; 5.9 Principal Concepts; 5.10 Study Questions; 5.11 Learning Activity; References; Chapter 6: Archerś Stakes in Cyber Space: Methods to Analyze Force Advantage; 6.1 Introduction; 6.2 Framework One; 6.2.1 Analysing State Deployment of Cyber Weapons; 6.2.2 Case Study One-Operation Orchard; 6.2.3 Analysing Operation Orchard; 6.3 Framework Two
Abstract : There is little doubt that cyber-space has become the battle space for confrontations. However, to conduct cyber operations, a new armory of weapons needs to be employed. No matter how many, or how sophisticated an aggressor's kinetic weapons are, they are useless in cyber-space. This book looks at the milieu of the cyber weapons industry, as well as the belligerents who use cyber weapons. It discusses what distinguishes these hardware devices and software programs from computer science in general. It does this by focusing on specific aspects of the topic--contextual issues of why cyber-space is the new battleground, defensive cyber weapons, offensive cyber weapons, dual-use weapons, and the implications these weapons systems have for practice. Contrary to popular opinion, the use of cyber weapons is not limited to nation states; though this is where the bulk of news reporting focuses. The reality is that there isn't a sector of the political-economy that is immune to cyber skirmishes. So, this book looks at cyber weapons not only by national security agencies and the military, but also by law enforcement, and the business sector--the latter includes administrations termed non-government organisations (NGOs). This book offers study material suitable for a wide-ranging audience--students, professionals, researchers, policy officers, and ICT specialists.--
Subject : Cyberspace operations (Military science)
Subject : Business mathematics systems.
Subject : Computer security.
Subject : Crime criminology.
Subject : Cyberspace operations (Military science)
Subject : HISTORY-- Military-- Other.
Subject : International relations.
Subject : TECHNOLOGY ENGINEERING-- Military Science.
Subject : Warfare defence.
Dewey Classification : ‭355.3/43‬
LC Classification : ‭U167.5.C92‬‭C93 2018eb‬
Added Entry : Prunckun, Hank,1954-
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟