思维导图备注

Inside Cyber Warfare - Jeffrey Carr
首页 收藏书籍 阅读记录
  • 书签 我的书签
  • 添加书签 添加书签 移除书签 移除书签

9. Investigating Attribution

浏览 6 扫码
  • 小字体
  • 中字体
  • 大字体
2022-02-24 01:24:15
请 登录 再阅读
上一篇:
下一篇:
  • 书签
  • 添加书签 移除书签
  • Inside Cyber Warfare
    • Foreword
    • Preface
      • How This Book Came to Be
      • Conventions Used in This Book
      • Attributions and Permissions
      • How to Contact Us
      • Safari® Books Online
      • Acknowledgments
    • 1. Assessing the Problem
      • Cyber Crime
      • Future Threats
      • The Conficker Worm: The Cyber Equivalent of an Extinction Event?
      • Africa: The Future Home of the World’s Largest Botnet?
      • The Way Forward
    • 2. The Rise of the Nonstate Hacker
      • The Russian Information War
      • The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead
      • Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria
      • Are Nonstate Hackers a Protected Asset?
    • 3. The Legal Status of Cyber Warfare
      • The Antarctic Treaty System and Space Law
      • UNCLOS
      • MLAT
      • The Law of Armed Conflict
      • Is This an Act of Cyber Warfare?
      • Cyber: The Chaotic Domain
    • 4. Responding to International Cyber Attacks as Acts of War
      • The Law of War
      • Nonstate Actors and the Law of War
      • Analyzing Cyber Attacks under Jus ad Bellum
      • The Choice to Use Active Defenses
      • Conclusion
    • 5. The Intelligence Component to Cyber Warfare
      • One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack
      • Ingushetia Conflict, August 2009
      • The Predictive Role of Intelligence
    • 6. Nonstate Hackers and the Social Web
      • China
      • The Middle East
      • Pakistani Hackers and Facebook
      • The Dark Side of Social Networks
      • TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences
      • Automating the Process
    • 7. Follow the Money
      • Components of a Bulletproof Network
      • The Bulletproof Network of StopGeorgia.ru
      • SORM-2
      • The Kremlin and the Russian Internet
      • A Three-Tier Model of Command and Control
    • 8. Organized Crime in Cyberspace
      • Russian Organized Crime and the Kremlin
    • 9. Investigating Attribution
      • Team Cymru and Its Darknet Report
      • Using WHOIS
    • 10. Weaponizing Malware
    • 11. The Role of Cyber in Military Doctrine
      • China Military Doctrine
    • 12. A Cyber Early Warning Model
    • 13. Advice for Policymakers from the Field
      • The United States Should Use Active Defenses to Defend Its Critical Information Systems
      • Scenarios and Options to Responding to Cyber Attacks
      • In Summary
      • Whole-of-Nation Cyber Security
    • 14. Conducting Operations in the Cyber-Space-Time Continuum
      • Social Networks: The Geopolitical Strategy of Russian Investment in Social Media
        • The Facebook Revolution
      • Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
    • 15. The Russian Federation: Information Warfare Framework
      • Russian Ministry of Defense
      • Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO)
      • Russian Federation Ministry of Communications and Mass Communications (Minsvyaz)
      • Further Research Areas
    • 16. Cyber Warfare Capabilities by Nation-State
      • Brazil
      • Canada
      • Czech Republic
      • Democratic People’s Republic of Korea
      • Estonia
      • European Union
      • France
      • Germany
      • India
      • Iran
      • Israel
      • Italy
      • Kenya
      • Myanmar
      • NATO
      • Netherlands
      • Nigeria
      • Pakistan
      • People’s Republic of China
      • Poland
      • Republic of Korea
      • Russian Federation
      • Singapore
      • South Africa
      • Sweden
      • Taiwan (Republic of China)
      • Turkey
      • United Kingdom
    • 17. US Department of Defense Cyber Command and Organizational Structure
      • Organization
    • 18. Active Defense for Cyber: A Legal Framework for Covert Countermeasures
      • Cyber Active Defense Under International Law
      • Cyber Active Defenses as Covert Action Under International Law
      • Cyber Attacks Under International Law: Nonstate Actors
    • Index
    • About the Author
    • Colophon
暂无相关搜索结果!
    展开/收起文章目录

    二维码

    手机扫一扫,轻松掌上学

    《Inside Cyber Warfare - Jeffrey Carr》电子书下载

    请下载您需要的格式的电子书,随时随地,享受学习的乐趣!
    EPUB 电子书

    书签列表

      阅读记录

      阅读进度: 0.00% ( 0/0 ) 重置阅读进度