Information Warfare and Security
This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitive information. We hear how they have tampered with medical records, disrupted emergency 911 systems, and siphoned money from bank accounts. Could information terrorists, using nothing more than a personal computer, cause planes to crash, widespread power blackouts, or financial chaos? Such real and imaginary scenarios, and our defense against them, are the stuff of information warfare-operations that target or exploit information media to win some objective over an adversary. Dorothy E. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary.
67 pages matching monitor in this book
Results 1-3 of 67
What people are saying - Write a review
We haven't found any reviews in the usual places.
A THEORY OF INFORMATION WARFARE
PLAYGROUNDS TO BATTLEGROUNDS
17 other sections not shown
agencies America Online attack authentication bank bomb called Center CERT/CC Chapter ciphertext communications Computer Crime computer networks Computer Security computer systems credit card numbers criminal cryptography customers cyber Cyberspace Cyberwar database December decrypt defensive information warfare denial-of-service attacks disk documents domain downloaded e-mail e-mail bombs electronic employee encryption espionage example exploit export federal files foreign fraud hackers hacking Ibid incidents information resources information security information systems information warfare infrastructure intelligence intercept Internet service providers intruder Iraqi key recovery law enforcement login machine military million mmap monitor National offensive on-line operations organizations password perception management person plaintext protect public key puter reported response Reuters server spam survey target telecommunications terrorist theft threats tion United user's virus viruses vulnerabilities Washington Post Winn Schwartau