Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [174]

By Root 1277 0
Attack, DST and the Kremlin, The Facebook Revolution

2009 DDoS attack against, One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack

Russian investments in, DST and the Kremlin, The Facebook Revolution

false identities, False Identities

Farris, Kate, China Military Doctrine

Federal Security Service Law (Russia), New Laws and Amendments

Federal Service for Technical and Export Control, The Federal Service for Technical and Export Control (FSTEC)—Military Unit (Vch) 96010

Fedorov, A.V., “RF Military Policy in International Information Security”

FEP, The Foundation for Effective Politics (FEP) (see Foundation for Effective Politics)

Ferguson, Paul, Atrivo/Intercage

financial fraud statistics, Cyber Crime

Finkelstein, David, Anti-Access Strategies

FISMA (Federal Information Security Management Act), Cyber: The Chaotic Domain

Force 10 Networks, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec

Foundation for Effective Politics (FEP), The Foundation for Effective Politics’ War on the Net (Day One), The Foundation for Effective Politics (FEP), Analysis

“Russia versus Georgia:War on the Net”, The Foundation for Effective Politics’ War on the Net (Day One)

France, cyber warfare capability, France

Fritz, Jason, Critical Infrastructure

future threats in cyberspace, Future Threats

G

Gaza Hacker Team, Gaza Hacker Team

Germany, cyber warfare capability, Germany

ghOst RAT, Social Engineering

GhostNet, Social Engineering, Case study: GhostNet cyber espionage

Goloskokov, Konstantin, The Estonian cyber attacks (2007)

Gorshenin, Vadim, The Foundation for Effective Politics (FEP)

H

Hacker Croll, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences

hacker “7”, Organized Crime in Cyberspace

Hackers Pal, Hackers Pal

Harper, Jim, Increasing Awareness

Heartland Payment Systems data breach (2009), Cyber Crime

Hoofnagle, Chris, Cyber Crime

Huawei Symantec Technologies Co. Ltd., Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec

sale of storage cluster to SimCenter, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec

Hull, Ralph, The Art of Misdirection

I

I-BGP (Internal Border Gateway Protocol), Using Open Source Internet Data

ID grabber–I, Owning social network users for a small budget of $300–$1,300

IDC, False Identities

identity theft, Foreword

immediacy of attacks, Cyber Attacks as Armed Attacks

imminency of attacks, A Subset of Self-Defense: Anticipatory Self-Defense

India, cyber warfare capability, India

Ingushetia.org (formerly Ingushetia.ru), Assessing the Problem, Ingushetia Conflict, August 2009

Institute for Security Technology Studies, The Russian Federation

instrument-based model of armed attacks, Cyber Attacks as Armed Attacks

IntelFusion.net, How This Book Came to Be

intellectual property theft, Foreword

intelligence collection, The Intelligence Component to Cyber Warfare, The Intelligence Component to Cyber Warfare, The Korean DDoS Attacks (July 2009), One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack, Ingushetia Conflict, August 2009, The Predictive Role of Intelligence, The Predictive Role of Intelligence, Follow the Money, False Identities, SORM-2, Investigating Attribution

attribution, Investigating Attribution (see attribution of cyber attacks)

DDoS attacks on social networking sites (August 2009), One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack

espionage and surveillance, The Predictive Role of Intelligence

false identities, uncovering, False Identities

Ingushetia conflict (August 2009), Ingushetia Conflict, August 2009

Korean DDoS attacks (July 2009), The Korean DDoS Attacks (July 2009)

money trails, Follow the Money

predictive role, The Predictive Role of Intelligence

Project Grey Goose, The Intelligence Component to Cyber Warfare

SORM-2, SORM-2

Intercage, Atrivo/Intercage

Internal

Return Main Page Previous Page Next Page

®Online Book Reader