Information Warfare and Security
Dorothy E. Denning
- 出版商: Addison Wesley
- 出版日期: 1998-12-20
- 售價: $686
- 語言: 英文
- 頁數: 544
- 裝訂: Paperback
- ISBN: 0201433036
- ISBN-13: 9780201433036
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$580$458 -
$680$537 -
$399Real World Linux Security: Intrusion Prevention, Detection and Recovery
-
$199Information Warfare: How to Survive Cyber Attacks
-
$980$774 -
$700Incident Response: A Strategic Guide to Handling System and Network Security Bre
-
$520$406 -
$920$727 -
$1,120$1,098 -
$1,520Linux System Security, 2/e
-
$650$553 -
$690$587 -
$750$675 -
$560$504 -
$1,068Fundamentals of Database Systems, 4/e (IE)
-
$480$379 -
$490$382 -
$999Physically Based Rendering: From Theory to Implementation (Hardcover)
-
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$580$452 -
$750$638 -
$680$646 -
$650$507 -
$450$356 -
$2,210$2,100
相關主題
商品描述
Description
This book provides a comprehensive and detailed look at information warfare: computer crime, cybercrime, and information terrorism. It describes attacks on information systems through theft, deception, or sabotage, and demonstrates the countermeasures being mounted to defeat these threats. Focusing on the criminals and information terrorists whose depredations include information-based threats to nations, corporations, and individuals, Denning places cybercrime within a broader context, integrating the various kinds of information crime, and the countermeasures against it, into a methodology-based framework.
Among the topics included are government use of information warfare for law enforcement investigations and for military and intelligence operations; also, the conflicts arising in the areas of free speech and encryption. The author discusses offensive information warfare, including acquisition of information, deceptive exploitation of information, and denial of access to information; and also addresses defensive information warfare, specifically, information security principles and practices. The book features coverage that is both broad and deep, illustrating cyberspace threats with real-world examples.
Table Of Contents
I. INTRODUCTION.
Information Warfare.
2. A Theory of Information Warfare.
Players.
The Defense.
A Dual Role.
Offensive Information Warfare.
Decreased Availability to Defensive Player.
Decreased Integrity.
Other Classification Schemes.
Defensive Information Warfare.
Information Security and Information Assurance.
The CIA Model and Authorization.
3. Playgrounds to Battlegrounds.
Culture.
More than Child's Play.
Crime.
Fraud.
Computer Fraud and Abuse.
Fighting Crime.
Individual Rights.
National Security.
War and Military Conflict.
Terrorism.
Netwars.
Protecting National Infrastructures.
II. OFFENSIVE INFORMATION WARFARE.
Privacy.
Web Browsing.
Privacy Regulations.
Piracy.
Trademark Infringement.
Dark Sides.
5. Psyops and Perception Management.
Fabrication.
Hoaxes.
Social Engineering.
Denouncement.
Defamation.
Harassment.
Advertising.
Spam Wars.
Censorship.
6. Inside the Fence.
Economic Espionage.
Corporate Espionage.
Privacy Compromises.
Business Relationships.
Visits and Requests.
Fraud and Embezzlement.
Data Diddling.
Inside Sabotage.
Software Attacks.
Penetrating the Perimeter.
Search and Seizure.
Dumpster Diving.
Bombs.
7. Seizing the Signals.
Pager Intercepts.
Law Enforcement Wiretaps.
Foreign Intelligence Intercepts.
Deciphering the Messages.
Traffic Analysis.
Location Tracking.
Telecommunications Fraud.
PBX and Related Fraud.
Voice Mail Fraud.
Calling Card Fraud.
Cloned Phones and Cellular Fraud.
Computer Network Monitoring.
Keystroke Monitoring.
Environment Surveillance.
Satellites and Imagery.
Van Eck Receptors.
Miscellaneous Sensors.
Shoulder Surfing.
Privacy and Accountability.
Sabotage.
Jamming.
Radio Frequency Weapons.
Physical Attacks.
8. Computer Break-Ins and Hacking.
Tools and Techniques.
Network Scanners.
Packet Sniffers.
Password Crackers.
Buffer Overows and Other Exploits.
Social Engineering.
Covering up Tracks.
Information Theft.
More than Trophies.
Tampering.
Domain Name Service Hacks.
Takedown.
Extent.
9. Masquerade.
Forged Documents and Messages.
Forgeries in Spam.
E-Mail Floods.
IP Spoofing.
Counterfeiting.
Trojan Horses.
Riding the Web.
E-Mail Relays.
Chipping.
Undercover Operations and Stings.
10. Cyberplagues.
Boot Viruses.
Macro Viruses.
Concealment Techniques.
Who Writes Viruses.
Prevalence.
Virus Hoaxes.
Worms.
III. DEFENSIVE INFORMATION WARFARE.
Cryptography.
Code Breaking.
Generation and Distribution of Keys.
Public-Key Distribution and Diffie-Hellman.
Public-Key Cryptography and RSA.
Key Storage and Recovery.
Applications of Encryption.
The Limits of Encryption.
Steganography.
Anonymity.
Sanitization.
Trash Disposal.
Shielding.
12. How to Tell a Fake.
Passwords and Other Secrets.
Integrity Checksums.
Digital Signatures.
Public-Key Management and Certificates.
Watermarks.
Call Back and Call Home.
Location-based Authentication.
Badges and Cards.
13. Monitors and Gatekeepers.
Access Control Monitors.
Limitations.
Filters.
Junk E-Mail Filters.
Web Filters.
Intrusion and Misuse Detection.
Automated Detection.
Computer Intrusion and Misuse Detection.
Analogy with the Human Immune System.
Detecting and Eradicating Viruses and Malicious Mobile Code.
14. In a Risky World.
Monitoring Security Publications.
Building It Secure.
The ITSEC and Common Criteria.
Evaluation.
Commercial Criteria.
ICSA Certification.
Accreditation.
The Capability Maturity Model.
Security Awareness and Training.
Avoiding Single Points of Failure.
Risk Management.
Insurance.
Benchmarking.
Due Care and Liability.
Incident Handling.
Containment and Recovery.
Improving Security.
Notification.
In-Kind Response.
Legal and Civil Remedies.
Economic and Military Response.
Emergency Preparedness.
Obstacles.
15. Defending the Nation.
Protecting Critical Infrastructures.
Presidential Decision Directive.
Encryption Policy.
Code Breaking.
International Policies.
U.S. Policy.
Legal Challenges.
Legislation.
Encryption Policy in Perspective.
Bibliography of Books.
Endnotes.
Index. 0201433036T04062001