Introduction to cyber-warfare : a multidisciplinary approach
Cyber Warfare conducted by organizations such as Anonymous and LulzSec and by nation states such as China, China, India, Iran, North Korea and the United States (Stuxnet) has become a global problem threatening governments, corporations and individuals. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare written by experts on the front lines, explores the cutting edge world of cyber-warfare through the use of recent case studies such as cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec and cyber-espionage and exploitation attempts that are sponsored by nations, such as China, Iran and North Korea and the recent Stuxnet attack. These topics and other s are discussed not only from a computer security perspective but also from multi-disciplinary approach including policy, military, sociological, and scientific aspects. . Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. . Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) . Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec . Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent
eBook,English, [2013]
Morgan Kaufmann Publishers, an imprint of Elsevier, Amsterdam [Netherlands], [2013]
Case studies
1 online resource (xvii, 318 pages)
9780124079267, 0124079261
846492852
1. Cyber Warfare: Here and Now
What Is Cyber War?
Is Cyber War a Credible Threat?
Attribution, Deception, and Intelligence
Information Assurance
I. Cyber Attack
2. Political Cyber Attack Comes of Age in 2007
Reliance on Information as a Vulnerability
Rudimentary but Effective: Denial of Service
Leaving Unwanted Messages: Web Site Defacement
Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack
Estonia Is Hit by Cyber Attacks
General Response to DDoS
Summary
Suggested Further Reading
3. How Cyber Attacks Augmented Russian Military Operations
The 2008 Russian Cyber Campaign Against Georgia
What Is Interesting About the Russian Cyber Campaign
Preparing for a Cyber-Capable Adversary
Summary
Suggested Further Reading
4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East
Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006
Civilians in the Cyber Melee: Operation Cast Lead
Summary
Suggested Further Reading
5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia
DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks
Silencing Novaya Gazeta and Other Russian Dissidents
Iran
How the 2009 Elections Led to Aggressive Cyber Operations
Summary
6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates
"Chaotic" Beginnings: The Chaos Computer Club; CCC
The Roots of the Anon
4chan, 7chan, and Other Message Boards
How We Are Influenced by 4chan: Memes
Anonymous
On Image, Structure, and Motivation
Anonymous
External Connections and Spin Offs
Your Security Is a Joke: LulzSec
Anonymous' Modus Operandi
Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous
Software for the Legion: Anonymous Products
Summary
Suggested Further Reading
II. Cyber Espionage And Exploitation
7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy
Introduction
Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine
Leveraging Resources Beyond the Military: The Cyber Warriors of China
Stealing Information from the U.S. Industrial-Military Complex: Titan Rain
Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China
Monitoring Dissidents: GhOstNet
Using Legitimate Web Sites for Data Exfiltration: The Shadow Network
Cyber War Through Intellectual Property Theft: Operation Aurora
An Example of the Current State of the Art: Sykipot
Summary
Suggested Further Reading
8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation
Introduction
Kernel Mode Rootkits
Vulnerabilities in the Operating System
Stolen Keying Material
Commonalities Between Stuxnet and Duqu
Information-Stealing Trojans
The Geography of Duqu
TDL3 and Other Malware
Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss
Summary
Suggested Further Reading
9. Losing Trust in Your Friends: Social Network Exploitation
Introduction
Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks
Designing Common Knowledge: Influencing a Social Network
Summary
Suggested Further Reading
10. How Iraqi Insurgents Watched U.S. Predator Video
Information Theft on the Tactical Battlefield
Introduction
The Predator UAV
Hacking the Predator Feed
Summary
Suggested Further Reading
III. Cyber Operations For Infrastructure Attack
11. Cyber Warfare Against Industry
Introduction
Industrial Control Systems: Critical Infrastructure for Modern Nations
Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply
How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology
How a Cyber Attack Led to Water Contamination The Maroochy Water Breach
Summary
Suggested Further Reading
12. Can Cyber. Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure
Introduction
Cyber Attacks Directed Against Power Grids
Destroying a Generator with a Cyber Attack: The Aurora Test
Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology
Summary
Suggested Further Reading
13. Attacking Iranian Nuclear Facilities: Stuxnet
Introduction
The Alleged Target: The Natanz Fuel Enrichment Facility
How Stuxnet Targets Industrial Control Systems
Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant
Stuxnet Is a Significant Advancement in Malware
Stuxnet Invalidates Several Security Assumptions
Implications for the Future
Summary
Suggested Further Reading
Conclusion and the Future of Cyber-Warfare
English
pmt-eu.hosted.exlibrisgroup.com Ebook Central Academic Complete UKI Edition
archive.org Free eBook from the Internet Archive
