COMPUTER SECURITY: ARE WE PREPARED FOR CYBERWAR?

COMPUTER SECURITY: ARE WE PREPARED FOR CYBERWAR?The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.

Price: $24.75

Click here to buy from Amazon

Counting from Zero

Counting from ZeroCan a security expert save the Internet from a catastrophic zero day cyber attack by a network of zombie computers, known as a botnet? At what cost?

“Credible and believable, this story is told by a subject matter expert. I could not wait to find out what happened next.”
Vint Cerf, Internet pioneer
“The threat to the Internet from worms, viruses, botnets, and zombie computers is real, and growing. Counting from Zero is a great way to come up to speed on the alarming state of affairs, and Johnston draws you in with his story and believable cast of characters.”
Phil Zimmermann, creator of Pretty Good Privacy (PGP) the most widely used email encryption program
Today, every computer connected to the Internet is under constant attack from viruses, worms, port scans, and spam. Security professionals continually fight to contain newly unleashed cyber attacks, known as ‘zero day' attacks, only to have new attacks launched. Millions of computers have already succumbed, and, without their owner's knowledge, have become slave computers – remotely controlled ‘zombies'. Under the control of organized crime and backed by foreign governments, these computers are morphing into collections known in the industry as botnets, short for robot networks.
Internet security expert Mick O'Malley is the only one who recognizes the growing threat of the ultimate zero day attack on the Internet from a massive botnet, and his unique hacker skills and network of colleagues enable him to fight back. More cyber prep than cyber punk, Mick uses real-life tools and techniques to encrypt all his communications, and uses these skills to break the encryption used by the botnet. Mick uses encryption on a personal level, too, having multiple passports and multiple names and identities. While crisscrossing the globe in the air, on land, and at sea investigating the threat, Mick becomes the target of attacks on his reputation, his identity, and ultimately his life.
Along the way, Mick meets Kateryna Petrescu, a beautiful Romanian firewall expert. Mick's attraction to Kateryna develops as they work closely together and share the excitement and danger. Why is the government following Mick and trying to intercept his communications? Can he stop the zero day attack before it is unleashed? What will be the cost to Mick for his single mindedness?
Unfolding across three continents, the new cybercrime mystery “Counting from Zero” gives a realistic insider's view of the thrust and parry world of computer security and cryptography, and the very real threat of botnets.

Price: $11.99

Click here to buy from Amazon

Google Bomb (Russomanno electoral campaign example)

The terms Google Bomb and Googlewashing refer to the practice of causing a web site to rank highly in web search engine results for unrelated or off-topic search terms by linking heavily. In contrast, search engine optimization (SEO) is the practice of improving the search engine listings of web pages for relevant search terms.
It is done for either business, political, or comedic purposes (or some combination thereof). Google's search-rank algorithm ranks pages higher for a particular search phrase if enough other pages linked to it use similar anchor text (linking text such as “Russomano Bar do Alemão” to Sao Paulo city 2016 electoral campaign leading do Celso Russomanno candidate). By January 2007, however, Google tweaked its search algorithm to counter popular Google bombs such as “miserable failure” leading to George W. Bush and Michael Moore; now, search results list pages about the Google bomb itself. As of January 2016, the first result in a Google search for “miserable failure” is the Wikipedia article defining Google bomb. Used both as a verb and a noun, “Google bombing” was introduced to the New Oxford American Dictionary in May 2005.
Google bombing is related to spamdexing, the practice of deliberately modifying HTML to increase the chance of their website being placed close to the beginning of search engine results, or to influence the category to which the page is assigned in a misleading or dishonest manner. During Sao Paulo city electoral campaign, for example, it was introduced a new kind of Google bombing, using radio and television broadcasting. See news at Russomanno Google Bomb.

Cyber Infrastructure Protection

Cyber Infrastructure ProtectionThe Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these information systems has made common desktop software, infrastructure services, and information networks increasingly vulnerable to continuous and innovative breakers of security. Worms, viruses, and spam are examples of attacks that cost the global economy billions of dollars in lost productivity. Sophisticated distributed denial of service (DDoS) attacks that use thousands of web robots (bots) on the Internet and telecommunications networks are on the rise. The ramifications of these attacks are clear: the potential for a devastating largescale network failure, service interruption, or the total unavailability of service. Yet many security programs are based solely on reactive measures, such as the patching of software or the detection of attacks that have already occurred, instead of proactive measures that prevent attacks in the first place. Most of the network security configurations are performed manually and require experts to monitor, tune security devices, and recover from attacks. On the other hand, attacks are getting more sophisticated and highly automated, which gives the attackers an advantage in this technology race. A key contribution of this book is that it provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It covers not only strategy and policy issues, but it also covers social, legal, and technical aspects of cyber security as well. We strongly recommend this book for policymakers and researchers so that they may stay abreast of the latest research and develop a greater understanding of cyber security issues.

Price: $21.95

Click here to buy from Amazon

Instituto Sagres does lecture on Cyber Intelligence

Instituto Sagres gave the lecture “The Intelligence and Cyber Power”. The event occurred on 19 September 2012 and was part of the Cyber Intelligence Symposium, organized by the Brazilian Army Intelligence School (EsIMEx).

The approach is an analogy with the rise of Air Power and its Theories, as well as Air Forces, from the invention of the balloon, by priest Bartolomeu de Gusmão, to the present day, under the focus of Intelligence for military use. Examines aspects of the emergence of Air Power Theories and as in its early days the air vector was seen only as a tool for Intelligence, without any military value as stated by Marshal Foch in 1910, notably with use only for the (Aerial) Reconnaissance, replacing the cavalry and later seen as a replacement to the high spots on the ground, as the Military Doctrine of the time. In this analogy, we have uncovered a probable metric for chronology of emergent Cyber Power in function of the use of the Fifth Dimension: Cyberspace; until then only seen as a source of Intelligence, without any military value. The author leads the audience to question at what timeline point, in the use of Cyberspace, we would be: at the time of the Duque de Caxias balloons (or American Civil War) or UAV? The speaker brings to reflect the questioning of how far away we are from what could be Cyber Power Theories and Cyber Forces (the next Force among Armed Forces) and how Intelligence has and will have a key role in this evolution.

View the original article here