TY - BOOK AU - Janczewski,Lech AU - Colarik,Andrew M. ED - IGI eBooks. ED - IGI Global. TI - Cyber warfare and cyber terrorism SN - 9781591409922 (ebook) AV - U163 .C946 2007e U1 - 355.3/43 22 PY - 2007/// CY - Hershey, Pa. PB - IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) KW - Information warfare KW - Computer crimes KW - Access control models KW - Anti-spam approaches KW - Behavioral information security KW - Bio-cyber machine gun KW - Bouncing techniques KW - Cryptography KW - Cyber forensics KW - Cyber security models KW - Cyber stalking KW - Cyber terrorism attacks KW - Cyber war defense KW - Databases KW - Data mining KW - Deception in cyber attacks KW - Denial-of-service (dos) attacks KW - Economics of cyber security KW - Electronic money management KW - Electronic surveillance and civil rights KW - Information warfare trends KW - Infrastructures of cyber warfare KW - Knowledge management KW - Malware KW - Personnel anomaly detection KW - Social engineering KW - Spam, spim and illegal advertisement KW - SQL code poisoning KW - Steganography KW - Terrorism and the internet KW - Electronic books KW - local N1 - Includes bibliographical references (p. 483-527) and index; 1. Cyber terrorism attacks / Kevin Curran, Kevin Concannon, Sean McKeever -- 2. Knowledge management, terrorism, and cyber terrorism / Gil Ariely -- 3. Ten information warfare trends / Kenneth Knapp, William Boulton -- 4. Bits and bytes vs. bullets and bombs / John Nugent, Mahesh Raisinghani -- 5. Infrastructures of cyber warfare / Robert Owen -- 6. Terrorism and the internet / M. Warren -- 7. Steganography / Merrill Warkentin, Mark Schmidt, Ernst Bekkering -- 8. Cryptography / Kevin Curran, Niall Smyth, Bryan McGrory -- 9. A roadmap for delivering trustworthy IT processes / Kassem Saleh, Imran Zualkerman, Ibrahim Al Kattan -- 10. An introduction to key themes in the economics of cyber security / Neil Gandal -- 11. Role of FS-ISAC in countering cyber terrorism / Manish Gupta, H. Rao -- 12. Deception in cyber attacks / Neil Rowe, E. Custy -- 13. Deception in defense of computer systems from cyber attack / Neil Rowe -- 14. Ethics of cyber war attacks / Neil Rowe -- 15. International outsourcing, personal data, and cyber terrorism / Kirk St.Amant -- 16. Network-based passive information gathering / Romuald Thion -- 17. Electronic money management in modern online businesses / Konstantinos Robotis, Theodoros Tzouramanis -- 18. The analysis of money laundering techniques / Krzysztof Woda -- 19. Spam, spim, and illegal advertisement / Dionysios Politis, Konstantinos Theodoridis -- 20. Malware / Stefan Kiltz, Andreas Lang, Jana Dittmann --; 21. SQL code poisoning / Theodoros Tzouramanis -- 22. Electronic surveillance and civil rights / Kevin Curran, Steven McIntyre, Hugo Meenan, Ciaran Heaney -- 23. Social engineering / B. Bhagyavati -- 24. Social engineering / Michael Aiello -- 25. Behavioral information security / Isabelle Fagnot -- 26. Toward a deeper understanding of personnel anomaly detection / Shuyuan Ho -- 27. Cyber stalking / Alok Mishra, Deepti Mishra -- 28. Cyber security models / Norman Schneidewind -- 29. Cyber war defense / Murray Jennex -- 30. Antispam approaches against information warfare / Hsin-Yang Lu, Chia-Jung Tsui, Joon Park -- 31. Denial-of-Service (DoS) attacks / Georg Disterer, Ame Alles, Axel Hervatin -- 32. Large-scale monitoring of critical digital infrastructures / Andr�e �Arnes -- 33. Public key infrastructures as a means for increasing network security / Ioannis Chochliouros, Stergios Chochliouros, Anastasia Spiliopoulou, Evita Lampadari -- 34. Use of geographic information systems in cyber warfare and cyber counterterrorism / Mark Leipnik -- 35. Use of remotely sensed imagery in cyber warfare and cyber counterterrorism / Gang Gong, Mark Leipnik -- 36. Hacking and eavesdropping / Kevin Curra, Peter Breslin, Kevin McLaughlin, Gary Tracey -- 37. Access control models / Romuald Thion -- 38. An overview of IDS using anomaly detection / Lior Rokach, Yuval Elovici -- 39. Bio-cyber machine gun / Andrews Samraj -- 40. Content-based policy specification for multimedia authorization and access control model / Bechara Al Bouna, Richard Chbeir --; 41. Data mining / Mark Last -- 42. Identification and localization of digital addresses on the internet / Andr�e �Arnes -- 43. Identification through data mining / Diego Liberati -- 44. A model for emergency response systems / Murray Jennex -- 45. Bouncing techniques / St�ephane Coulondre -- 46. Cyber forensics / St�ephane Coulondre -- 47. Software component survivability in information warfare / Joon Park, Joseph Giordano -- 48. Taxonomy for computer security incidents / Stefan Kiltz, Andreas Lang, Jana Dittmann -- 49. Measures for ensuring data protection and citizen privacy against the threat of crime and terrorism / Ioannis Chochliouros, Anastasia Spiliopoulou, Stergios Chochliouros -- 50. EU tackles cybercrime / Sylvia Mercado-Kierkegaard -- 51. The U.S. military response to cyber warfare / Richard Kilroy Jr. -- 52. USA's view on world cyber security issues / Norman Schneidewind -- 53. ECHELON and the NSA / D. Webb -- 54. International Cybercrime Convention / Sylvia Mercado-Kierkegaard; Restricted to subscribers or individual electronic text purchasers; Also available in print N2 - This book provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks UR - http://ezproxy.alfaisal.edu/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-991-5 UR - http://www.loc.gov/catdir/toc/ecip077/2006102336.html ER -