Information Warfare and Security
Dorothy E. Denning
$948Real World Linux Security: Intrusion Prevention, Detection and Recovery
$99Information Warfare: How to Survive Cyber Attacks
$840Incident Response: A Strategic Guide to Handling System and Network Security Bre
$1,300Physically Based Rendering: From Theory to Implementation (Hardcover)
This book provides a comprehensive and detailed look at information warfare: computer crime, cybercrime, and information terrorism. It describes attacks on information systems through theft, deception, or sabotage, and demonstrates the countermeasures being mounted to defeat these threats. Focusing on the criminals and information terrorists whose depredations include information-based threats to nations, corporations, and individuals, Denning places cybercrime within a broader context, integrating the various kinds of information crime, and the countermeasures against it, into a methodology-based framework.
Among the topics included are government use of information warfare for law enforcement investigations and for military and intelligence operations; also, the conflicts arising in the areas of free speech and encryption. The author discusses offensive information warfare, including acquisition of information, deceptive exploitation of information, and denial of access to information; and also addresses defensive information warfare, specifically, information security principles and practices. The book features coverage that is both broad and deep, illustrating cyberspace threats with real-world examples.
2. A Theory of Information Warfare.
A Dual Role.
Offensive Information Warfare.
Decreased Availability to Defensive Player.
Other Classification Schemes.
Defensive Information Warfare.
Information Security and Information Assurance.
The CIA Model and Authorization.
3. Playgrounds to Battlegrounds.
More than Child's Play.
Computer Fraud and Abuse.
War and Military Conflict.
Protecting National Infrastructures.
II. OFFENSIVE INFORMATION WARFARE.
5. Psyops and Perception Management.
6. Inside the Fence.
Visits and Requests.
Fraud and Embezzlement.
Penetrating the Perimeter.
Search and Seizure.
7. Seizing the Signals.
Law Enforcement Wiretaps.
Foreign Intelligence Intercepts.
Deciphering the Messages.
PBX and Related Fraud.
Voice Mail Fraud.
Calling Card Fraud.
Cloned Phones and Cellular Fraud.
Computer Network Monitoring.
Satellites and Imagery.
Van Eck Receptors.
Privacy and Accountability.
Radio Frequency Weapons.
8. Computer Break-Ins and Hacking.
Tools and Techniques.
Buffer Overows and Other Exploits.
Covering up Tracks.
More than Trophies.
Domain Name Service Hacks.
Forged Documents and Messages.
Forgeries in Spam.
Riding the Web.
Undercover Operations and Stings.
Who Writes Viruses.
III. DEFENSIVE INFORMATION WARFARE.
Generation and Distribution of Keys.
Public-Key Distribution and Diffie-Hellman.
Public-Key Cryptography and RSA.
Key Storage and Recovery.
Applications of Encryption.
The Limits of Encryption.
12. How to Tell a Fake.
Passwords and Other Secrets.
Public-Key Management and Certificates.
Call Back and Call Home.
Badges and Cards.
13. Monitors and Gatekeepers.
Access Control Monitors.
Junk E-Mail Filters.
Intrusion and Misuse Detection.
Computer Intrusion and Misuse Detection.
Analogy with the Human Immune System.
Detecting and Eradicating Viruses and Malicious Mobile Code.
14. In a Risky World.
Monitoring Security Publications.
Building It Secure.
The ITSEC and Common Criteria.
The Capability Maturity Model.
Security Awareness and Training.
Avoiding Single Points of Failure.
Due Care and Liability.
Containment and Recovery.
Legal and Civil Remedies.
Economic and Military Response.
15. Defending the Nation.
Protecting Critical Infrastructures.
Presidential Decision Directive.
Encryption Policy in Perspective.
Bibliography of Books.