The Next War Zone: Confronting the Global Threat of CyberterrorismThe next war is going to take place on a new battlefield: your own computer. You can't see it, but it's there, hidden in your home PC. A threat so potent, it could destroy massive amounts of data, and shut down power plants, fuel supplies, space satellites, the armed forces, millions of computers, and even parts of the Internet. A virtually undetectable but devastating new weapon is cyberwarfare, the next wave of terrorism, and it could be launched from your very own computer. Thousands of computer super viruses, monster worms, and zombies created by terrorists and rogue governments are the new tools of war with the potential for catastrophic results. The author sounds the alarm on what could be the nation's next surprise attack -- a cyber Pearl Harbor just waiting to happen. Every day, there are warnings of computer viruses and Internet weaknesses with the potential to disrupt society. Most are the work of amateur hackers. But consider also the super zombies, military-grade computer weapons being created by government cyberwar units. Virtually undetectable, they have the power to destroy everything, lethally spread via the Internet, and hide on home computers, waiting to be unleashed. Despite constant warnings about our cyber vulnerability, and billions of dollars spent defending our networks, the risk of catastrophic cyber attacks continues to grow. The author explains the rules of cyberwar -- what it is, what could happen, and how to protect yourself from becoming a pawn. From real-life attack scenarios to explanations of monster viruses; from cyberwarriors to what forces pose the most dangerous threats, he offers clear, concise information for fighting back against a phantom enemy that may be the deadliest we've ever known. |
Contents
Bringing the War Home | 5 |
The Major Unknown | 13 |
Where Cyberwar Came From | 19 |
Copyright | |
10 other sections not shown
Other editions - View all
The Next War Zone: Confronting the Global Threat of Cyberterrorism James F. Dunnigan Limited preview - 2003 |
Common terms and phrases
Afghanistan agencies Air Force aircraft Al Qaeda American antivirus software army ARPANET battlefield black hats black-hat hackers bombs bugs Center China Chinese civilian Code Red combat command commercial communications computer displays connected credit card criminals cyber cyberwar cyberwar attacks cyberwarfare cyberwarriors damage data mining database DDOS attacks Department of Defense developed digitalization e-mail electronic encryption enemy equipment files firewall flaws Gulf War guys hacking hats Honey Pot Information War Infrastructure Internet crime Internet security keep Linux look major messages Microsoft software military million missile modem nations NIPC operating system OPSEC organizations passwords percent police problem protection radar radio satellites scanning script kiddies secret server SIPRNET skills someone stuff sysadmins target telephone terrorists there's things threat tion troops United virus vulnerable warfare weapons white-hat hackers World ZEZOV