Information Warfare and SecurityWhat individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitive information. We hear how they have tampered with medical records, disrupted emergency 911 systems, and siphoned money from bank accounts. Could information terrorists, using nothing more than a personal computer, cause planes to crash, widespread power blackouts, or financial chaos? Such real and imaginary scenarios, and our defense against them, are the stuff of information warfare-operations that target or exploit information media to win some objective over an adversary. Dorothy E. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary. You will find in this book:
Whatever your interest or role in the emerging field of information warfare, this book will give you the background you need to make informed judgments about potential threats and our defenses against them. 0201433036B04062001 |
From inside the book
Results 1-3 of 85
... on the freedom of Internet speech . " 54 ( Other parts of the CDA were ... line investor bulletin boards . The man behind the pseudonym came forward ... on the Internet , where it is so easy for people to hide their identities ...
... line scams , fraud on the Internet increased three- fold in 1996.69 Many scams are of the " get - rich - quick ... on - line payment systems . Most scam art- ists have traditionally collected their money off line by check or money order ...
Dorothy Elizabeth Robling Denning. On the Internet , forged messages can live on into perpetuity , archived in databases . New readers can stumble onto the messages , never knowing they have since been discredited . Robert Ames was one ...
Contents
GULF WARINFOWAR | 3 |
A THEORY OF INFORMATION WARFARE | 21 |
PLAYGROUNDS TO BATTLEGROUNDS | 43 |
Copyright | |
19 other sections not shown