Information Warfare: How to Survive Cyber Attacks
Information warfare is a large organised effort to obtain and destroy information by whatever means possible with the intent of destroying or taking over a goverment or corporate entity. This guide provides information on the emerging super-intelligent anti-social subculture of hackers and cyber-terrorists as well as practical recommendation on how they can be stopped. The defensive strategies and counter measures are desigined to help companies survive infrastructure attacks, military conflicts, competitive intellegence gathering, economic warfare and corporate espionage. This study answers the need of IT professionals to protect their computer and computer-based assets.
What people are saying - Write a review
We haven't found any reviews in the usual places.
A New Framework for Analysis
Measuring the Economic Impact of Information Warfare
How Ten People
11 other sections not shown
Agenda for Action aggressor assessment civilian law enforcement communications computer crime computer security computer systems containment information warfare cooperation countries crime cyber-terrorism cyberspace damage destruction develop disable disruption economic impact efforts electronic commerce global hack High High High Moderate impact of information information infrastructure information systems information technology information warfare attacks information warfare capabilities information warfare defense information warfare strategies information warriors InfraGard Internet Internet service providers investigators law enforcement agencies Love Bug Low Moderate ment military organizations nation Networks Offensive containment offensive ruinous information operations Personal computers personnel PH2 team police political population potential private companies protect Provide Information Warfare random and sustained Random rogue Random terrorist region rogue criminals rogue information warfare ruinous information warfare skills Software sustained terrorist information target telecommunications terrorist groups terrorist information warfare terrorists and criminals terrorists and rogue threat tion virus viruses websites
Proceedings of the 2nd European Conference on Information Warfare and ...
No preview available - 2003
All Book Search results »
Proceedings of the 3rd European Conference on Information Warfare and ...
No preview available - 2004