Cyber Warfare and Cyber Terrorism

Front Cover
Janczewski, Lech
Idea Group Inc (IGI), May 31, 2007 - Political Science - 564 pages
3 Reviews

Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field.

Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.

What people are saying - Write a review

User Review - Flag as inappropriate

Terrorism & Invisible Balance of Power
By Imran Farooqi
In his book, “Invisible Balance of Power, US vs Islamic Militants: Dangerous Shift in International Relations”, published in 2005, Sajjad
Shaukat has taken present ‘different war’ as an interaction of ‘state terrorism’ led by the United States and the ‘group terrorism’ by the Al Qaeda or Islamic militants. It is notable that a number of authors have written books about the 9/11 tragedy, but ground realities developed in accordance with the book. After seeing the main title, some people think that the book is against the US or its western allies, but without any prejudice, he has discussed both the sovereign and non-sovereign entities on parallel lines in this research-based book. On the one hand, he has pointed out Al Qaeda’s ambush attacks, targeted killings, beheadings etc., while on the other, he has mentioned special operations by the US forces in Afghanistan and Iraq, and CIA-tortures cells in various Islamic countries. In this regard, missile strikes by the drones on Pakistan’s tribal areas and elsewhere amounts to state terrorism, which are being responded by the internal backlash…suicide attacks and hostage-takings by the Muslim radicals. Shaukat has proved that both the warring parties kill innocent civilians through ruthless terror.
Giving a number of references of the power-theorists like Machiavelli, Hobbes, Morgentahu etc. Shaukat has written that power factor or use of force has failed in this different war which took origin from the privileged and unprivileged status quo led by the most developed states and the less developed countries respectively.
Besides, Shaukat has introduced new ideas about the issues relating to the Islamic ideology, Jehad, liberalism, Western world, terrorism, causes of suicide attacks etc.
Particularly, future observations of the author like a prolonged war, failure of military paradigm by the state actors in coping with the non-state actors, increase in US cost of war, rise of more terrorism, unsuccessful mission of NATO in Afghanistan, plane plot in UK, international financial crisis, warlike situation between America and Iran, Syria and Israel including other developments have proved correct.
Shaukat also gave positive suggestions to the US, but President Obama did not act upon them. Therefore war on terror has resulted into more implications as already predicted by the author. For example, he elaborated that Al Qaeda fighters have been creating economic instability in the world through their subversive acts, giving a blow to the larger economies of the US and the developed nations.
The book indicates that realism (power factor) must be reconciled with idealism, which is essential for world peace and geo-political interests of the US-led developed countries and those of the small countries by reforming the system of the UN.
It is due to the present scenario of war against terrorism—which already pointed out by the author that the publisher reprinted the book after seven years.
Main Title: Invisible Balance of Power
Author: Sajjad Shaukat -ISBN, 9690019589
Published by: Ferozsons, 60 Shahrah-i-Quaid-i-Azam, Lahore, Pakistan
Date of Publication: 2005
Pages: 245
Price: Rs. 495
Reprinted in 2013, Price: Rs. 595
Publisher’s Email: support@ferozsons.com.pk
www.@ferozsons.com.pk
Telephone: 0092 42 35712024
0092 42 35712276
Author’s Email: sajjad_logic@yahoo.com
 

Other editions - View all

About the author (2007)

Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP’s Technical Committee on Security and Protection in Information Processing Systems (TC-11).

Andrew Colarik has accumulated over twenty five years experience of knowledge utilizing computer information systems. This includes systems analysis and design, network administration, university level teaching, and the justification, specification, and implementation of factory and office automation. He is the holder of a Ph. D. in Information Systems from the University of Auckland, and a Masters of Business Administration from Kent State University. As a researcher, author, and inventor, Dr. Colarik has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents. [Editor]

Bibliographic information