Amazon Price: N/A (as of March 24, 2017 01:27 –
Public government statements have cited cyber-attacks by terrorists as a major concern for national security. To date, no large-scale cyber-terrorist attack has been observed, but terrorists are known to be using the Internet for various routine purposes. The discovery of Stuxnet in 2010 was a milestone in the arena of cybersecurity because, although a malware attack on industrial control systems was long believed to be theoretically possible, it was different to see malware used in reality to cause real physical damage. Stuxnet demonstrated that a sufficiently determined adversary with sufficient resources might be able to damage U.S. critical infrastructure physically through a cyber attack. Did Stuxnet change the threat of cyber-terrorism?
This monograph examines cyberterrorism before and after Stuxnet by addressing three questions: 1) Motive—Are terrorists interested in launching cyber-attacks against U.S. critical infrastructures? 2) Means —Are terrorists building capabilities and skills for cyberattacks? and, 3) Opportunity—How vulnerable are U.S. critical infrastructures? Answers to these questions give a characterization of the post-Stuxnet cyberterrorism threat. The next question is why a major cyber-terrorist attack has not happened yet; this is explained from a cost-benefit perspective. Although cyberterrorism may not be an imminent threat, there are reasons to be concerned about the long-term threat and inevitability of cyberattacks. It is important to assess frequently the threat landscape and current government policies for enhancing the protection of national infrastructures.
Amazon Price: $70.00 $70.00 (as of March 23, 2017 22:27 –
Today we find web applications in every environment independent of a company's size and even in home networks. This fact made web applications also attractive to cyber criminals as there are new attack vectors like Cross Site Scripting, Remote File Inclusions (RFI) and SQL Injections. Such so called web based attacks can be found on every vulnerability statistic because of these attacks are so widespread. Criminals not only break into web applications, they also overtake whole web servers which than can become part of a botnet or even become a command and control server of such. GlastopfNG, is a honeypot specialized on simulating a vulnerable web server/application to become a target of automated or even manual attack. Instead of trying to block these attacks Glastopf tries to get as much information as possible about the attacker and the used attack itself. This gathered information can then be used in different ways to protect real applications in the future against such attacks.
Amazon Price: $26.00 $19.16 You save: $6.84 (26%). (as of March 24, 2017 10:20 –
The revolutions that swept the Middle East in 2011 surprised and captivated the world. Brutal regimes that had been in power for decades were overturned by an irrepressible mass of freedom seekers. Now, one of the figures who emerged during the Egyptian uprising tells the riveting inside story of what happened and shares the keys to unleashing the power of crowds.
Wael Ghonim was a little-known, thirty-year-old Google executive in the summer of 2010 when he anonymously launched a Facebook page to protest the death of one Egyptian man at the hands of security forces. The page’s following expanded quickly and moved from online protests to a nonconfrontational movement.
Amazon Price: N/A (as of March 24, 2017 10:57 –
Deep Web: how not to drown
Step-by-Step Guide for Anonymus (provide online security and go out into the dark web)