The Next War Zone: Confronting the Global Threat of Cyberterrorism
The next war is going to take place on a new battlefield: your own computer. You can't see it, but it's there, hidden in your home PC. A threat so potent, it could destroy massive amounts of data, and shut down power plants, fuel supplies, space satellites, the armed forces, millions of computers, and even parts of the Internet. A virtually undetectable but devastating new weapon is cyberwarfare, the next wave of terrorism, and it could be launched from your very own computer. Thousands of computer super viruses, monster worms, and zombies created by terrorists and rogue governments are the new tools of war with the potential for catastrophic results. The author sounds the alarm on what could be the nation's next surprise attack -- a cyber Pearl Harbor just waiting to happen. Every day, there are warnings of computer viruses and Internet weaknesses with the potential to disrupt society. Most are the work of amateur hackers. But consider also the super zombies, military-grade computer weapons being created by government cyberwar units. Virtually undetectable, they have the power to destroy everything, lethally spread via the Internet, and hide on home computers, waiting to be unleashed. Despite constant warnings about our cyber vulnerability, and billions of dollars spent defending our networks, the risk of catastrophic cyber attacks continues to grow. The author explains the rules of cyberwar -- what it is, what could happen, and how to protect yourself from becoming a pawn. From real-life attack scenarios to explanations of monster viruses; from cyberwarriors to what forces pose the most dangerous threats, he offers clear, concise information for fighting back against a phantom enemy that may be the deadliest we've ever known.
19 pages matching flaws in this book
Results 1-3 of 19
What people are saying - Write a review
We haven't found any reviews in the usual places.
Where Cyberwar Came From
The Internet Built to Be Nuked
8 other sections not shown
Afghanistan agencies Air Force aircraft Alexander American antivirus antivirus software army ARPANET battlefield BBSs black-hat hackers bombers bombs browser bugs Center China Chinese civilian Code Red combat commanders commercial communications connected created credit card criminals cyber cyberwar cyberwar attacks cyberwarfare cyberwarriors damage DDOS attacks Department of Defense developed e-mail electronic encryption enemy equipment files firewall flaws going guys hack Honey Pot Information Warfare Infrastructure Internet crime Internet users Iraq keep Kosovo Linux logic bomb look mainframe major messages military million missile modems nations NIPC operating system OPSEC organizations passwords percent police problem protect Qaeda quickly radar radio satellites script kiddies secret server SIPRNET skills someone stuff sysadmins targets telephone terrorists there's things thousands tion Trojan horses troops United virus vulnerable weapons World Wide Web