Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [179]

By Root 1250 0
Technical and Export Control (FSTEC), The Federal Service for Technical and Export Control (FSTEC)—Military Unit (Vch) 96010

Minsvyaz, Russian Federation Ministry of Communications and Mass Communications (Minsvyaz), The cyber vigilantes

misdirection, The Art of Misdirection

Mitina, Darya, Nashi

MLAT (Mutual Legal Assistance Treaties), MLAT

MOICE (Microsoft Office Isolated Conversion Environment), Using technologies such as MOICE and virtualization

money trails, Follow the Money

Moonlight Maze, The Russian Federation

Moran, Ned, A Cyber Early Warning Model

Mulvenon, James, Anti-Access Strategies

Myanmar, cyber warfare capability, Myanmar

N

Nashi, The Foundation for Effective Politics’ War on the Net (Day One), One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack, Nashi

possible involvement in attacks on Cyxymu, One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack

National Guard (United States), US Strategic Command (USSTRATCOM)

National Security Agency (United States), Office of the Secretary of Defense

NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE), The Legal Status of Cyber Warfare

NATO, cyber warfare capability, NATO

Naval Criminal Investigative Service (United States), US Strategic Command (USSTRATCOM)

Naval Information Operations Command (United States), US Strategic Command (USSTRATCOM)

Naval Network Warfare Command (United States), US Strategic Command (USSTRATCOM)

Navy Cyber Defense Operations Command (United States), US Strategic Command (USSTRATCOM)

necessity, Jus in Bello Issues Related to the Use of Active Defenses

NetBridge, Social Networks: The Geopolitical Strategy of Russian Investment in Social Media

Network Operations Security Centers (United States), Summary

Nicolescu, Basarab, Conducting Operations in the Cyber-Space-Time Continuum

Nigerian government cyber policies, Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria

Nimr al-Iraq, Nimr al-Iraq (“The Tiger of Iraq”) and XX_Hacker_XX

nonstate actors, Nonstate Actors and the Law of War

nonstate hackers status in host countries, Are Nonstate Hackers a Protected Asset?

North Korea, North Korea, South Korea, The DPRK’s Capabilities in Cyberspace, Democratic People’s Republic of Korea

cyber warfare incidents, North Korea, South Korea

international law and, South Korea

cyberspace capabilities, The DPRK’s Capabilities in Cyberspace, Democratic People’s Republic of Korea

nuclear nonproliferation treaties, Nuclear Nonproliferation Treaties

nuclear plants, cyber attacks on, Critical Infrastructure, Critical Infrastructure

Nugache malware, Command, control, and exfiltration of data

O

Office of the Assistant Secretary of Defense for Global Strategic Affairs (United States), Office of the Secretary of Defense

Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics (United States), Office of the Secretary of Defense

Office of the Under Secretary of Defense for Intelligence (United States), Office of the Secretary of Defense

Office of the Under Secretary of Defense for Policy (United States), Office of the Secretary of Defense

“On Personal Data”, Russian Federal Law 152-FZ, New Laws and Amendments

open source information retrieval libraries, Automating the Process

open source intelligence (OSINT), How This Book Came to Be

Operation Cast Lead, Israel, The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead, Impact, Overview of Perpetrators, Motivations, Hackers’ Profiles, Methods of Attack, Israeli Retaliation

cyber incidents arising from, The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead, Impact, Overview of Perpetrators, Motivations, Hackers’ Profiles, Methods of Attack, Israeli Retaliation

attack methods, Methods of Attack

hackers’ profiles, Hackers’ Profiles

impact, Impact

Israeli retaliation, Israeli Retaliation

motivations, Motivations

perpetrators, Overview of Perpetrators

Operation DarkMarket, Cyber

Return Main Page Previous Page Next Page

®Online Book Reader