Introduction to Cyber-Warfare: A Multidisciplinary Approach Front Cover

Introduction to Cyber-Warfare: A Multidisciplinary Approach

  • Length: 336 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2013-06-18
  • ISBN-10: 0124078141
  • ISBN-13: 9780124078147
  • Sales Rank: #1376122 (See Top 100 Books)
Description

Cyber Warfare has become a global problem threatening governments, corporations and individuals. This new domain of warfare is not only inhabited by governments such as China, Russia, Iran, and the United States, but a variety of other actors including insurgent groups like Hezbollah and Hamas as well as hacking groups such as Anonymous, LulzSec, and others. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare, written by experts on the front lines, explores the cutting edge world of cyber-warfare including the following:

  • Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play.
  • Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)
  • Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec
  • Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent

Table of Contents

Chapter 1. Cyber Warfare: Here and Now

Part I: Cyber Attack
Chapter 2. Political Cyber Attack Comes of Age in 2007
Chapter 3. How Cyber Attacks Augmented Russian Military Operations
Chapter 4. When Who Tells the Best Story Wins
Chapter 5. Limiting Free Speech on the Internet
Chapter 6. Cyber Attacks by Nonstate Hacking Groups

Part II: Cyber Espionage and Exploitation
Chapter 7. Enter the Dragon
Chapter 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation
Chapter 9. Losing Trust in Your Friends
Chapter 10. How Iraqi Insurgents Watched U.S. Predator Video—Information Theft on the Tactical Battlefield

Part III: Cyber Operations for Infrastructure Attack
Chapter 11. Cyber Warfare Against Industry
Chapter 12. Can Cyber Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure
Chapter 13. Attacking Iranian Nuclear Facilities: Stuxnet

Appendix I. Chapter 6: LulzSec Hacktivities
Appendix II. Chapter 6: Anonymous Timeline

To access the link, solve the captcha.