Inside Cyber Warfare - Jeffrey Carr [171]
cyber attacks, Foreword, Increasing Awareness, Critical Infrastructure, Critical Infrastructure, The Law of Armed Conflict, Cyber Attacks as Armed Attacks, Cyber Attacks as Armed Attacks, Establishing State Responsibility for Cyber Attacks, The Korean DDoS Attacks (July 2009), Organized Crime in Cyberspace, What Is an Autonomous System Network?, A New Threat Landscape, Cases Studies of Previous Cyber Attacks, Case study: Cyber attacks against Georgia, Case study: GhostNet cyber espionage, Case study: Cyber attacks against Denmark, Lessons Learned, Lessons Learned, Scenarios and Options to Responding to Cyber Attacks, Scenarios and Options to Responding to Cyber Attacks, Cyber Attacks Under International Law: Nonstate Actors, Cyber Attacks Under International Law: Nonstate Actors
(see also cyber security)
5-stage model for politically motivated attacks, Lessons Learned
attack scenarios and responses, Scenarios and Options to Responding to Cyber Attacks
attribution, The Law of Armed Conflict, The Korean DDoS Attacks (July 2009)
difficulties with, The Korean DDoS Attacks (July 2009)
case studies, Cases Studies of Previous Cyber Attacks, Case study: Cyber attacks against Georgia, Case study: GhostNet cyber espionage, Case study: Cyber attacks against Denmark
attacks on Denmark, Case study: Cyber attacks against Denmark
GhostNet espionage, Case study: GhostNet cyber espionage
Russian-Georgian War (2008), Case study: Cyber attacks against Georgia
classification as armed attacks, Cyber Attacks as Armed Attacks, Cyber Attacks as Armed Attacks
criteria for interpretation, Cyber Attacks as Armed Attacks
emerging threats, A New Threat Landscape (see emerging threats)
establishing state responsibility for, Establishing State Responsibility for Cyber Attacks
geographic independence, What Is an Autonomous System Network?
increasing awareness of potential impacts, Increasing Awareness
international law regarding nonstate actors, Cyber Attacks Under International Law: Nonstate Actors, Cyber Attacks Under International Law: Nonstate Actors
nuclear plants, Critical Infrastructure, Critical Infrastructure
actual attacks, Critical Infrastructure
organized crime, involvement in, Organized Crime in Cyberspace
preparing defense against, Lessons Learned
cyber crime, Cyber Crime, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences, Owning social network users for a small budget of $300–$1,300, Organized Crime in Cyberspace, Russian Organized Crime and the Kremlin
automated exploits for sale, Owning social network users for a small budget of $300–$1,300
organized crime, Organized Crime in Cyberspace, Russian Organized Crime and the Kremlin
Twittergate (May 2009), TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences
cyber early warning networks, Cyber Early Warning Networks, Building an Analytical Framework for Cyber Early Warning, Latent tensions, Cyber reconnaissance, Initiating event, Cyber mobilization, Cyber attack, Defense Readiness Condition for Cyberspace
analytical framework, Building an Analytical Framework for Cyber Early Warning, Latent tensions, Cyber reconnaissance, Initiating event, Cyber mobilization, Cyber attack
consideration of state and nonstate actors, Latent tensions
cyber attacks, Cyber attack
initiating events, Initiating event
mobilization, Cyber mobilization
reconnaissance, Cyber reconnaissance
Defense Readiness Conditions (DEFCON) for cyberspace, Defense Readiness Condition for Cyberspace
cyber espionage, Cyber Espionage, Titan Rain
Titan Rain, Titan Rain
cyber security, Foreword, Advice for Policymakers from the Field, In Summary, When It Comes to Cyber Warfare: Shoot the Hostage, When It Comes to Cyber Warfare: Shoot the Hostage, The United States Should Use Active Defenses to Defend Its Critical Information Systems, Scenarios and