×
思维导图备注
Inside Cyber Warfare - Jeffrey Carr
首页
收藏书籍
阅读记录
书签管理
我的书签
添加书签
移除书签
Inside Cyber Warfare
浏览
17
扫码
小字体
中字体
大字体
2022-02-24 01:24:14
请
登录
再阅读
上一篇:
下一篇:
Inside Cyber Warfare
Foreword
Preface
How This Book Came to Be
Conventions Used in This Book
Attributions and Permissions
How to Contact Us
Safari® Books Online
Acknowledgments
1. Assessing the Problem
Cyber Crime
Future Threats
The Conficker Worm: The Cyber Equivalent of an Extinction Event?
Africa: The Future Home of the World’s Largest Botnet?
The Way Forward
2. The Rise of the Nonstate Hacker
The Russian Information War
The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead
Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria
Are Nonstate Hackers a Protected Asset?
3. The Legal Status of Cyber Warfare
The Antarctic Treaty System and Space Law
UNCLOS
MLAT
The Law of Armed Conflict
Is This an Act of Cyber Warfare?
Cyber: The Chaotic Domain
4. Responding to International Cyber Attacks as Acts of War
The Law of War
Nonstate Actors and the Law of War
Analyzing Cyber Attacks under Jus ad Bellum
The Choice to Use Active Defenses
Conclusion
5. The Intelligence Component to Cyber Warfare
One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack
Ingushetia Conflict, August 2009
The Predictive Role of Intelligence
6. Nonstate Hackers and the Social Web
China
The Middle East
Pakistani Hackers and Facebook
The Dark Side of Social Networks
TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences
Automating the Process
7. Follow the Money
Components of a Bulletproof Network
The Bulletproof Network of StopGeorgia.ru
SORM-2
The Kremlin and the Russian Internet
A Three-Tier Model of Command and Control
8. Organized Crime in Cyberspace
Russian Organized Crime and the Kremlin
9. Investigating Attribution
Team Cymru and Its Darknet Report
Using WHOIS
10. Weaponizing Malware
11. The Role of Cyber in Military Doctrine
China Military Doctrine
12. A Cyber Early Warning Model
13. Advice for Policymakers from the Field
The United States Should Use Active Defenses to Defend Its Critical Information Systems
Scenarios and Options to Responding to Cyber Attacks
In Summary
Whole-of-Nation Cyber Security
14. Conducting Operations in the Cyber-Space-Time Continuum
Social Networks: The Geopolitical Strategy of Russian Investment in Social Media
The Facebook Revolution
Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
15. The Russian Federation: Information Warfare Framework
Russian Ministry of Defense
Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO)
Russian Federation Ministry of Communications and Mass Communications (Minsvyaz)
Further Research Areas
16. Cyber Warfare Capabilities by Nation-State
Brazil
Canada
Czech Republic
Democratic People’s Republic of Korea
Estonia
European Union
France
Germany
India
Iran
Israel
Italy
Kenya
Myanmar
NATO
Netherlands
Nigeria
Pakistan
People’s Republic of China
Poland
Republic of Korea
Russian Federation
Singapore
South Africa
Sweden
Taiwan (Republic of China)
Turkey
United Kingdom
17. US Department of Defense Cyber Command and Organizational Structure
Organization
18. Active Defense for Cyber: A Legal Framework for Covert Countermeasures
Cyber Active Defense Under International Law
Cyber Active Defenses as Covert Action Under International Law
Cyber Attacks Under International Law: Nonstate Actors
Index
About the Author
Colophon
暂无相关搜索结果!
×
二维码
手机扫一扫,轻松掌上学
×
《Inside Cyber Warfare - Jeffrey Carr》电子书下载
请下载您需要的格式的电子书,随时随地,享受学习的乐趣!
EPUB 电子书
×
书签列表
×
阅读记录
阅读进度:
0.00%
(
0/0
)
重置阅读进度