Anatomy of Cyberterrorism: Is America Vulnerable? (Computer Hacking and Security)

Amazon Price: $17.95 $17.95 (as of June 22, 2017 17:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The United States is vulnerable to attacks from cyberterrorists. A “Digital World Trade Center Attack”, possibly killing thousands and causing billions of dollars in damage. This paper will provide fundamental background information on what cyberterror is and what it means. It also presents a model to understand the anatomy of cyberterrorism, describing some real-world cyber events, assesses cyberterrorist capabilities, and finally makes specific recommendations for improvement in cyber security.

Cyber Defense (2nd ed.)

The US military is preparing for 21st Century electronic warfare and cyber terrorism. A joint US Cyber Command and four service cyber commands have been set up.

Their mission is to defend American military networks and civilian American infrastructure from cyber terrorism and from foreign government hackers.

The officers leading these cyber commands explain how they are organized, how they operate, and how they will protect the United States from foreign military hackers, intelligence agencies, and cyber terrorists.

13,450 words

Price: $3.99

Click here to buy from Amazon

iWar: War and Peace in the Information Age

Rating: 
Amazon Price: N/A (as of June 22, 2017 19:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

New York Times bestselling author and veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars.

America is at war, but most of its citizens don’t know it.
Continue reading “iWar: War and Peace in the Information Age”

Computer Attack and Cyberterrorism

Computer Attack and CyberterrorismMany international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a co-ordinated attack against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a co-ordinated cyberattack against the U.S. critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorists' goals. While there is no published evidence that terrorist organizations are currently planning a co-ordinated attack against computers, computer system vulnerabilities persist world-wide, and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called ‘bots', that direct large numbers of compromised computers to launch attacks through the Internet as swarms. The growing trend toward the use of more automated attack tools has also overwhelmed some of the current methodologies used for tracking Internet cyberattacks. This book provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack.The book also describes the possible effects of a co-ordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. Issues for Congress may include how could trends in cyberattacks be measured more effectively; what is appropriate guidance for DOD use of cyberweapons; should cybersecurity be combined with, or remain separate from, the physical security organization within DHS; how can commercial vendors be encouraged to improve the security of their products; and what are options to encourage U.S. citizens to follow better cybersecurity practices. Appendices to this book describe computer viruses, spyware, and ‘bot networks', and how malicious programs are used to enable cybercrime and cyberespionage. Also, similarities are drawn between planning tactics currently used by computer hackers and those used by terrorists groups for conventional attacks.

Price: $37.00

Click here to buy from Amazon

Asymmetric Warfare: Threat and Response in the 21st Century

Asymmetric Warfare: Threat and Response in the 21st CenturyIn recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies.

In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities.

This is an indispensable guide to one of the key topics in security studies today.

Price: $26.95

Click here to buy from Amazon