Cyber weaponry : issues and implications of digital arms /: issues and implications of digital arms. ([2018])
- Record Type:
- Book
- Title:
- Cyber weaponry : issues and implications of digital arms /: issues and implications of digital arms. ([2018])
- Main Title:
- Cyber weaponry : issues and implications of digital arms
- Further Information:
- Note: Henry Prunckun, editor.
- Editors:
- Prunckun, Hank, 1954-
- Contents:
- Intro; Dedication; Foreword; Preface; About the Study Questions; Acknowledgment; Contents; Chapter 1: Weaponization of Computers; 1.1 Weaponization; 1.2 Weaponizing Computers; 1.3 How Is Weaponizing Done?; 1.4 Who Does It?; 1.5 Implications for Policy and Practice; 1.5.1 Legislative Control; 1.5.2 Malware Marketplaces; 1.5.3 Need for Self-Defence; 1.5.4 Personal Privacy; 1.5.5 Dual-Purpose Weapons; 1.5.6 Business Sector and Non-government Organizations; 1.5.7 Cyber War; 1.5.8 Stateś Obligation to Citizen Protection; 1.5.9 Use in Disrupting Drug Trafficking; 1.5.10 Cyber Counterintelligence 1.6 Cyber-Security Myth1.7 Principal Concepts; 1.8 Study Questions; 1.9 Learning Activity; Reference; Chapter 2: Human Nature and Cyber Weaponry: Use of Denial and Deception in Cyber Counterintelligence; 2.1 Background; 2.2 The Cyber Espionage Threat; 2.3 Counterintelligence Definitions, Status, and Frameworks; 2.4 Cyber Counterintelligence Framework in Active Cyber Defense; 2.5 Cyber Denial and Deception Techniques and Technologies to Enhance Cyber Counterintelligence in Active Cyber Defense; 2.6 Hypothetical Case Study; 2.7 Conclusion; 2.8 Principal Concepts; 2.9 Study Questions 2.10 Learning ActivitiesReferences; Chapter 3: The Human Element: The ``Trigger ́́on Cyber Weapons; 3.1 Introduction; 3.2 Rationale; 3.3 Who; 3.4 How; 3.4.1 Attack Vectors; 3.5 Why; 3.5.1 Identify Vital Information Assets; 3.5.2 Assess Your Vital Information Assets ́Vulnerability; 3.5.3 Vital Information; 3.5.3.1Intro; Dedication; Foreword; Preface; About the Study Questions; Acknowledgment; Contents; Chapter 1: Weaponization of Computers; 1.1 Weaponization; 1.2 Weaponizing Computers; 1.3 How Is Weaponizing Done?; 1.4 Who Does It?; 1.5 Implications for Policy and Practice; 1.5.1 Legislative Control; 1.5.2 Malware Marketplaces; 1.5.3 Need for Self-Defence; 1.5.4 Personal Privacy; 1.5.5 Dual-Purpose Weapons; 1.5.6 Business Sector and Non-government Organizations; 1.5.7 Cyber War; 1.5.8 Stateś Obligation to Citizen Protection; 1.5.9 Use in Disrupting Drug Trafficking; 1.5.10 Cyber Counterintelligence 1.6 Cyber-Security Myth1.7 Principal Concepts; 1.8 Study Questions; 1.9 Learning Activity; Reference; Chapter 2: Human Nature and Cyber Weaponry: Use of Denial and Deception in Cyber Counterintelligence; 2.1 Background; 2.2 The Cyber Espionage Threat; 2.3 Counterintelligence Definitions, Status, and Frameworks; 2.4 Cyber Counterintelligence Framework in Active Cyber Defense; 2.5 Cyber Denial and Deception Techniques and Technologies to Enhance Cyber Counterintelligence in Active Cyber Defense; 2.6 Hypothetical Case Study; 2.7 Conclusion; 2.8 Principal Concepts; 2.9 Study Questions 2.10 Learning ActivitiesReferences; Chapter 3: The Human Element: The ``Trigger ́́on Cyber Weapons; 3.1 Introduction; 3.2 Rationale; 3.3 Who; 3.4 How; 3.4.1 Attack Vectors; 3.5 Why; 3.5.1 Identify Vital Information Assets; 3.5.2 Assess Your Vital Information Assets ́Vulnerability; 3.5.3 Vital Information; 3.5.3.1 Basics; 3.5.3.2 IT Infrastructure; 3.5.3.3 Internet of Things; 3.5.3.4 Public Networks and Social Media; 3.5.4 Reinforce Basic Protections; 3.5.5 Improve Awareness; 3.5.6 Act, But Do Not Over React; 3.6 Best Practice; 3.7 Conclusion; 3.8 Principal Concepts; 3.9 Study Questions 3.10 Learning ActivityReferences; Chapter 4: Cyber Defense for IMGs and NGOs Using Crime Prevention Through Environmental Design; 4.1 Background; 4.2 Introduction; 4.3 Role of Social Media in Protest; 4.4 Background to CPTED; 4.5 Developing a Cyber Defence Plan; 4.5.1 Creating the Network; 4.5.2 Gathering Information; 4.5.3 Sending Information; 4.6 Using CPTED; 4.6.1 Surveillance; 4.6.2 Legibility; 4.6.3 Territoriality; 4.6.4 Ownership of the Space; 4.6.5 Management of the Space; 4.6.6 Vulnerability; 4.7 Agent Provocateur; 4.8 Conclusion; 4.9 Principal Concepts; 4.10 Study Questions 4.11 Learning ActivityReferences; Chapter 5: Drinking from a Fire Hydrant: Information Overload As a Cyber Weapon; 5.1 Introduction; 5.2 Cyber War; 5.3 Fog of War; 5.4 Typology; 5.5 X Axis; 5.6 Y Axis; 5.7 Z Axis; 5.8 Conclusion; 5.9 Principal Concepts; 5.10 Study Questions; 5.11 Learning Activity; References; Chapter 6: Archerś Stakes in Cyber Space: Methods to Analyze Force Advantage; 6.1 Introduction; 6.2 Framework One; 6.2.1 Analysing State Deployment of Cyber Weapons; 6.2.2 Case Study One-Operation Orchard; 6.2.3 Analysing Operation Orchard; 6.3 Framework Two … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Copyright Date:
- 2018
- Extent:
- 1 online resource, illustrations
- Subjects:
- 355.3/43
Criminology
Cyberspace operations (Military science)
Public safety
Security, International
Computer security
Management information systems
Computer crimes
Politics and war
HISTORY / Military / Other
TECHNOLOGY & ENGINEERING / Military Science
Cyberspace operations (Military science)
Political Science -- Political Freedom & Security -- International Security
Computers -- Security -- General
Computers -- Enterprise Applications -- General
Social Science -- Criminology
International relations
Computer security
Business mathematics & systems
Crime & criminology
Warfare & defence
Electronic books - Languages:
- English
- ISBNs:
- 9783319741079
3319741071 - Related ISBNs:
- 9783319741062
3319741063 - Notes:
- Note: Includes bibliographical references and index.
Note: Vendor-supplied metadata. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.367043
- Ingest File:
- 03_017.xml