Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [170]

By Root 1288 0
WHOIS, Caveats to Using WHOIS

Russian military doctrine and, Creating a legend for a cyber attack

Australia, cyber warfare capability, Australia

automated registration, searcher, and group creator, Owning social network users for a small budget of $300–$1,300

autonomous system (AS) network, Using Open Source Internet Data, Using Open Source Internet Data, What Is an Autonomous System Network?, What Is an Autonomous System Network?

AS numbers, What Is an Autonomous System Network?

B

BENCHMARK stored procedure, SQL injection, blind SQL injection, and using BENCHMARK

Bennett, Senator Robert, The Russian Federation

BGP, Using Open Source Internet Data (see Border Gateway Protocol)

binary file formats, Research is the key to offensive capabilities

BIOS-based rootkit attacks, BIOS-Based Rootkit Attack

Bizeuf, David, Organized Crime in Cyberspace

blind SQL injection, SQL injection, blind SQL injection, and using BENCHMARK

Border Gateway Protocol (BGP), Using Open Source Internet Data, What Is an Autonomous System Network?

routing map, What Is an Autonomous System Network?

botnets, Africa: The Future Home of the World’s Largest Botnet?, The Botnet Versus the Malware, McColo: Bulletproof Hosting for the World’s Largest Botnets

Korean DDoS attacks (2009), The Botnet Versus the Malware

McColo hosting of largest botnets, McColo: Bulletproof Hosting for the World’s Largest Botnets

Brazil, cyber warfare capability, Brazil

Bukovskaya, Anna, The Kremlin Spy for Hire Program, The Kremlin Spy for Hire Program

bulletproof networks, False Identities, SoftLayer Technologies

Burutine, Aleksandr, “Wars of the Future Will Be Information Wars”

butterfly effect, Conducting Operations in the Cyber-Space-Time Continuum

C

C-H Team, C-H Team (aka H-C Team)

Canada, cyber warfare capability, Canada

carders, McColo: Bulletproof Hosting for the World’s Largest Botnets

CCDCOE (NATO Cooperative Cyber Defense Center of Excellence), The Legal Status of Cyber Warfare

channel consolidation, Channel Consolidation

Chilton, General Kevin P., The Legal Status of Cyber Warfare

China, China, China, China, China, Are Nonstate Hackers a Protected Asset?, United States, China, China Military Doctrine, The 36 Stratagems, China Military Doctrine, China Military Doctrine, Anti-Access Strategies, The 36 Stratagems, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec, People’s Republic of China

China Hacker Emergency Meeting Center, China

Chinese Red Hacker Alliance, China

Chinese-US aircraft collision (2001), China

cyber warfare capability, People’s Republic of China

cyber warfare incidents, China, United States

international law and, United States

Ezhou information war exercise, China Military Doctrine

investment in Symantec, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec

military doctrine for cyber war, China Military Doctrine, The 36 Stratagems, Anti-Access Strategies, The 36 Stratagems

36 stratagems, The 36 Stratagems

anti-access strategies, Anti-Access Strategies

policy towards nonstate hackers, Are Nonstate Hackers a Protected Asset?

social networking sites, China

superiority of math and science students, China Military Doctrine

Chronicles of Information Warfare, Chronicles of Information Warfare

client-side exploits, Why client-side 0day vulnerabilities can be so devastating

CNAs, China Military Doctrine (see computer network attacks)

CNE, China Military Doctrine (see computer network exploitation)

Cold Zero, Cold Zero (aka Cold Z3ro or Roma Burner)

complexity theory, Conducting Operations in the Cyber-Space-Time Continuum

Comprehensive National Cybersecurity Initiative, Foreword

computer network attacks (CNAs), China Military Doctrine

computer network exploitation (CNE), China Military Doctrine

computer viruses and RBN, Organized Crime in Cyberspace

Conficker worm, The Conficker Worm: The Cyber Equivalent of an Extinction Event?

critical infrastructure, vulnerability to attack, Critical Infrastructure

cross-site

Return Main Page Previous Page Next Page

®Online Book Reader