Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [171]

By Root 1233 0
scripting exploits for social networks, Owning social network users for a small budget of $300–$1,300

cyber attacks, Foreword, Increasing Awareness, Critical Infrastructure, Critical Infrastructure, The Law of Armed Conflict, Cyber Attacks as Armed Attacks, Cyber Attacks as Armed Attacks, Establishing State Responsibility for Cyber Attacks, The Korean DDoS Attacks (July 2009), Organized Crime in Cyberspace, What Is an Autonomous System Network?, A New Threat Landscape, Cases Studies of Previous Cyber Attacks, Case study: Cyber attacks against Georgia, Case study: GhostNet cyber espionage, Case study: Cyber attacks against Denmark, Lessons Learned, Lessons Learned, Scenarios and Options to Responding to Cyber Attacks, Scenarios and Options to Responding to Cyber Attacks, Cyber Attacks Under International Law: Nonstate Actors, Cyber Attacks Under International Law: Nonstate Actors

(see also cyber security)

5-stage model for politically motivated attacks, Lessons Learned

attack scenarios and responses, Scenarios and Options to Responding to Cyber Attacks

attribution, The Law of Armed Conflict, The Korean DDoS Attacks (July 2009)

difficulties with, The Korean DDoS Attacks (July 2009)

case studies, Cases Studies of Previous Cyber Attacks, Case study: Cyber attacks against Georgia, Case study: GhostNet cyber espionage, Case study: Cyber attacks against Denmark

attacks on Denmark, Case study: Cyber attacks against Denmark

GhostNet espionage, Case study: GhostNet cyber espionage

Russian-Georgian War (2008), Case study: Cyber attacks against Georgia

classification as armed attacks, Cyber Attacks as Armed Attacks, Cyber Attacks as Armed Attacks

criteria for interpretation, Cyber Attacks as Armed Attacks

emerging threats, A New Threat Landscape (see emerging threats)

establishing state responsibility for, Establishing State Responsibility for Cyber Attacks

geographic independence, What Is an Autonomous System Network?

increasing awareness of potential impacts, Increasing Awareness

international law regarding nonstate actors, Cyber Attacks Under International Law: Nonstate Actors, Cyber Attacks Under International Law: Nonstate Actors

nuclear plants, Critical Infrastructure, Critical Infrastructure

actual attacks, Critical Infrastructure

organized crime, involvement in, Organized Crime in Cyberspace

preparing defense against, Lessons Learned

cyber crime, Cyber Crime, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences, Owning social network users for a small budget of $300–$1,300, Organized Crime in Cyberspace, Russian Organized Crime and the Kremlin

automated exploits for sale, Owning social network users for a small budget of $300–$1,300

organized crime, Organized Crime in Cyberspace, Russian Organized Crime and the Kremlin

Twittergate (May 2009), TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences

cyber early warning networks, Cyber Early Warning Networks, Building an Analytical Framework for Cyber Early Warning, Latent tensions, Cyber reconnaissance, Initiating event, Cyber mobilization, Cyber attack, Defense Readiness Condition for Cyberspace

analytical framework, Building an Analytical Framework for Cyber Early Warning, Latent tensions, Cyber reconnaissance, Initiating event, Cyber mobilization, Cyber attack

consideration of state and nonstate actors, Latent tensions

cyber attacks, Cyber attack

initiating events, Initiating event

mobilization, Cyber mobilization

reconnaissance, Cyber reconnaissance

Defense Readiness Conditions (DEFCON) for cyberspace, Defense Readiness Condition for Cyberspace

cyber espionage, Cyber Espionage, Titan Rain

Titan Rain, Titan Rain

cyber security, Foreword, Advice for Policymakers from the Field, In Summary, When It Comes to Cyber Warfare: Shoot the Hostage, When It Comes to Cyber Warfare: Shoot the Hostage, The United States Should Use Active Defenses to Defend Its Critical Information Systems, Scenarios and

Return Main Page Previous Page Next Page

®Online Book Reader