Inside Cyber Warfare: Mapping the Cyber Underworld

Capa
"O'Reilly Media, Inc.", 2012 - 294 páginas

Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

The second edition goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside recent cyber-conflicts, including the use of Stuxnet. It also includes a Forward by Michael Chertoff (former Secretary of Homeland Security) and several guest essays, including one by Melissa Hathaway, former senior advisor to the Director of National Intelligence and Cyber Coordination Executive.

Get an in-depth look at hot topics including:

  • The role of social networks in fomenting revolution in the Middle East and Northern Africa
  • The Kremlin's strategy to invest heavily in social networks (including Facebook) and how it benefits the Russian government
  • How the U.S. Cyber Command and equivalent commands are being stood up in other countries
  • The rise of Anonymous with analysis of its anti-structure and operational style or tempo
  • Stuxnet and its predecessors, and what they reveal about the inherent weaknesses in critical infrastructure
  • The Intellectual Property (IP) war, and how it has become the primary focus of state-sponsored cyber operations
 

Conteúdo

Chapter 1 Assessing the Problem
1
Chapter 2 The Rise of the Nonstate Hacker
15
Chapter 3 The Legal Status of Cyber Warfare
31
Chapter 4 Responding to International Cyber Attacks as Acts of War
45
Chapter 5 The Intelligence Component to Cyber Warfare
77
Chapter 6 Nonstate Hackers and the Social Web
89
Chapter 7 Follow the Money
103
Chapter 8 Organized Crime in Cyberspace
121
Chapter 11 The Role of Cyber in Military Doctrine
161
Chapter 12 A Cyber Early Warning Model
179
Chapter 13 Advice for Policymakers from the Field
191
Chapter 14 Conducting Operations in the CyberSpaceTime Continuum
203
Information Warfare Framework
217
Chapter 16 Cyber Warfare Capabilities by NationState
243
Chapter 17 US Department of Defense Cyber Command and Organizational Structure
263
A Legal Framework for Covert Countermeasures
273

Chapter 9 Investigating Attribution
131
Chapter 10 Weaponizing Malware
141

Outras edições - Ver todos

Termos e frases comuns

Sobre o autor (2012)

Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, columnist for Symantec's Security Focus, and author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers. Mr. Carr is the Principal Investigator for Project Grey Goose, an Open Source intelligence investigation into the Russian cyber attacks on Georgia in August, 2008. The Grey Goose Phase I and Phase II reports have been widely read and well-received throughout the Intelligence, Defense, and Law Enforcement agencies of Western governments. His work has been quoted in The New York Times, The Washington Post, The Guardian, BusinessWeek, Parameters, and Wired.

Informações bibliográficas