Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [173]

By Root 1243 0

Kyrgyzstan (2009), Kyrgyzstan

Myanmar, Myanmar

Russia-Georgia War (2008), The StopGeorgia.ru Project Forum

Zimbabwe, Zimbabwe

Defense Criminal Investigative Services (United States), US Strategic Command (USSTRATCOM)

Defense Intelligence Agency (United States), Office of the Secretary of Defense

Defense Security Service (United States), Office of the Secretary of Defense

Defense Technology Security Administration (United States), Office of the Secretary of Defense

Definition of Aggression resolution, 1974, Cyber Attacks as Armed Attacks

Democratic People’s Republic of Korea, cyber warfare capability, Democratic People’s Republic of Korea

Department of Defense Criminal Investigative Services (United States), US Strategic Command (USSTRATCOM)

Department of Defense Directive 3100.10, Active Defense for Cyber: A Legal Framework for Covert Countermeasures

Dhanjani, Nitesh, An Adversary’s Look at LinkedIn

Dietrich, Sven, Command, control, and exfiltration of data

Digital Sky Technologies (DST), 2005: A Turning Point, DST and the Kremlin, DST and the Kremlin, The Facebook Revolution

DST-Global 2, The Facebook Revolution

Facebook, investments in, DST and the Kremlin

Russian government connections, DST and the Kremlin

directness of attacks, Cyber Attacks as Armed Attacks

Dittrich, Dave, Command, control, and exfiltration of data

DNS, Using Open Source Internet Data (see domain name system)

DNS Team, DNS Team

DOD Cyber Crime Center (United States), US Strategic Command (USSTRATCOM)

domain name system (DNS), Using Open Source Internet Data

Drogin, Bob, The Russian Federation

Drokova, Mariya, Nashi

DST, 2005: A Turning Point (see Digital Sky Technologies)

DZ Team, DZ Team

E

E-BGP (External Border Gateway Protocol), Using Open Source Internet Data

effects-based model of armed attacks, Cyber Attacks as Armed Attacks

Ehudbarak.org.il, Impact

Elkus, Adam, Cyber mobilization

email spam, use in DDoS attacks, One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack

emerging threats, A New Threat Landscape, StopGeorgia.ru Malware Discussions, Twitter as DDoS Command Post against Iran, Social Engineering, Channel Consolidation, An Adversary’s Look at LinkedIn, BIOS-Based Rootkit Attack, Malware for Hire, Anti-Virus Software Cannot Protect You, Targeted Attacks Against Military Brass and Government Executives, Research is the key to offensive capabilities, Delivery of targeted attacks, Command, control, and exfiltration of data, Why client-side 0day vulnerabilities can be so devastating

anti-virus software vulnerabilities, Anti-Virus Software Cannot Protect You

BIOS-based rootkit attacks, BIOS-Based Rootkit Attack

channel consolodation, Channel Consolidation

LinkedIn analysis, An Adversary’s Look at LinkedIn

malware for hire, Malware for Hire

social engineering, Social Engineering

SQL injection, StopGeorgia.ru Malware Discussions

targeted attacks, Targeted Attacks Against Military Brass and Government Executives, Research is the key to offensive capabilities, Delivery of targeted attacks, Command, control, and exfiltration of data, Why client-side 0day vulnerabilities can be so devastating

client-side exploits, Why client-side 0day vulnerabilities can be so devastating

covert malware, Command, control, and exfiltration of data

delivery of attack, Delivery of targeted attacks

researching of targets, Research is the key to offensive capabilities

Twitter and DDoS attacks in Iran, Twitter as DDoS Command Post against Iran

ESTDomains, ESTDomains

Estonia, cyber warfare capability, Estonia

Estonian cyber attacks (2007), The Estonian cyber attacks (2007)

European Commission report on cyber threats, Future Threats

European Convention on Cybercrime, Support from International Conventions

European Union, cyber warfare capability, European Union

evolution of cyber attacks, Cyber Crime

External Border Gateway Protocol (E-BGP), Using Open Source Internet Data

F

Facebook, One Year After the RU-GE War, Social Networking Sites Fall to DDoS

Return Main Page Previous Page Next Page

®Online Book Reader