Cyber warfare and cyber terrorism

This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against atta...

Full description

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Janczewski, Lech, 1943-, Colarik, Andrew M.
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2007.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 07465cam a2200805 a 4500
001 29299
003 IGIG
005 20100616114528.0
006 m eo d
007 cr bn||||m|||a
008 061222s2007 paua fob 001 0 eng d
010 # # |z 2006102336 
020 # # |a 9781591409922 (ebook) 
020 # # |z 1591409918 (hardcover) 
020 # # |z 9781591409915 (hardcover) 
020 # # |z 9781616927493 (pbk.) 
024 7 # |a 10.4018/978-1-59140-991-5  |2 doi 
035 # # |a (CaBNVSL)gtp00541070 
035 # # |a (OCoLC)537782913 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a U163  |b .C946 2007e 
082 0 4 |a 355.3/43  |2 22 
245 0 0 |a Cyber warfare and cyber terrorism  |c [edited by] Lech J. Janczewski, Andrew M. Colarik.  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c c2007. 
300 # # |a electronic texts (xxx, 532 p. : ill.) :  |b digital files. 
504 # # |a Includes bibliographical references (p. 483-527) and index. 
505 0 # |a 1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 
505 0 # |a 21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / André Årnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir -- 
505 0 # |a 41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / André Årnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / Stéphane Coulondre -- 46. Cyber forensics / Stéphane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Title from PDF t.p. (viewed on June 5, 2010). 
650 # 0 |a Information warfare. 
650 # 0 |a Computer crimes. 
653 # # |a Access control models 
653 # # |a Anti-spam approaches 
653 # # |a Behavioral information security 
653 # # |a Bio-cyber machine gun 
653 # # |a Bouncing techniques 
653 # # |a Cryptography 
653 # # |a Cyber forensics 
653 # # |a Cyber security models 
653 # # |a Cyber stalking 
653 # # |a Cyber terrorism attacks 
653 # # |a Cyber war defense 
653 # # |a Databases 
653 # # |a Data mining 
653 # # |a Deception in cyber attacks 
653 # # |a Denial-of-service (dos) attacks 
653 # # |a Economics of cyber security 
653 # # |a Electronic money management 
653 # # |a Electronic surveillance and civil rights 
653 # # |a Information warfare trends 
653 # # |a Infrastructures of cyber warfare 
653 # # |a Knowledge management 
653 # # |a Malware 
653 # # |a Personnel anomaly detection 
653 # # |a Social engineering 
653 # # |a Spam, spim and illegal advertisement 
653 # # |a SQL code poisoning 
653 # # |a Steganography 
653 # # |a Terrorism and the internet 
700 1 # |a Janczewski, Lech,  |d 1943- 
700 1 # |a Colarik, Andrew M. 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC) 2006102336  |z 9781591409915  |z 1591409918 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5  |z View fulltext via EzAccess