CyberWar

Si Vis Pacem, Para Bellum

By

Cyber Infrastructure Protection

Cyber Infrastructure ProtectionThe Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these information systems has made common desktop software, infrastructure services, and information networks increasingly vulnerable to continuous and innovative breakers of security. Worms, viruses, and spam are examples of attacks that cost the global economy billions of dollars in lost productivity. Sophisticated distributed denial of service (DDoS) attacks that use thousands of web robots (bots) on the Internet and telecommunications networks are on the rise. The ramifications of these attacks are clear: the potential for a devastating largescale network failure, service interruption, or the total unavailability of service. Yet many security programs are based solely on reactive measures, such as the patching of software or the detection of attacks that have already occurred, instead of proactive measures that prevent attacks in the first place. Most of the network security configurations are performed manually and require experts to monitor, tune security devices, and recover from attacks. On the other hand, attacks are getting more sophisticated and highly automated, which gives the attackers an advantage in this technology race. A key contribution of this book is that it provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It covers not only strategy and policy issues, but it also covers social, legal, and technical aspects of cyber security as well. We strongly recommend this book for policymakers and researchers so that they may stay abreast of the latest research and develop a greater understanding of cyber security issues.

Price: $21.95

Click here to buy from Amazon

By

Information Warfare, Cyber-Terrorism and Community Values

Information Warfare, Cyber-Terrorism and Community ValuesThis is a AIR FORCE INST OF TECH WRIGHT-PATTERSONAFB OH report procured by the Pentagon and made available for public release. It has been reproduced in the best form available to the Pentagon. It is not spiral-bound, but rather assembled with Velobinding in a soft, white linen cover. The Storming Media report number is A017014. The abstract provided by the Pentagon follows: Information Warfare involves the attack and defense of information and information systems, both in time of armed conflict and in operations short of war. While information technology provides the promise of a new class of less lethal military instruments, it also presents vulnerabilities occasioned by widespread dependence on an increasingly complex and interconnected global information infrastructure. These vulnerabilities, when exploited by those who would target civilians in order to inspire widespread fear in hopes of accomplishing a political agenda, can be understood as cyberterrorism. As information warfare techniques evolve, those employing them should look to several relevant sources for normative guidance. Relevant, internationally shared values can be found in international custom, the U.N. Charter, treaties dealing with the subject of “cybercrime,” those governing the communication media likely to be utilized by information warriors, UNGA Resolutions and those treaties and customary norms that make up the Law of Armed Conflict.

Price:

Click here to buy from Amazon

By

Safeguarding Infrastructure from Cyber-terrorism: Measuring and Protecting SCADA

Safeguarding Infrastructure Assets from Cyber-terrorism: Measuring and Protecting SCADA systems from Cyber-terrorists in AustraliaTerrorist groups are currently using information and communication technologies to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of cyber-capability to coordinate cyber attacks. This book explores the possibility that cyber-terrorists may have developed or may have future capabilities to attack critical infrastructure by accessing Supervisory Control and Data Acquisition (SCADA) systems within Australia and throughout the world. The book characterises the Australian security and terrorism environment and discusses the vulnerability of Australian computer systems and control systems. It also discusses the cyber-capability of various terrorist groups, SCADA risk evaluation methods and presents a framework to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. This framework forms the main basis of this research and is examined by three focus group interviews, signifying the need for new counter-terrorism security models to assist with assessing new cyber security threats such as cyber-terrorism. This contribution is of great value to the SCADA community and organisations.

Price: $111.00

Click here to buy from Amazon

By

CyberWar, CyberTerror, CyberCrime

The world is becoming ever more interconnected and vulnerable, as has been demonstrated by the recent cyber attacks on Estonia. Thus the need for stringent and comprehensive methods for combating cyber crime and terror have never before been needed more than now. CyberWar, CyberTerror, CyberCrime is a straightforward and pragmatic guide. It details how best practices and standards can be used to combat cyber criminals and terrorists. This book is written by Dr. Julie Mehan who is a Principal Analyst for a strategic consulting firm in the State of Virginia. She has been a Government Service employee, a strategic consultant, and an entrepreneur. Until November 2007, she was the co-founder of a small woman-owned company focusing on secure, assured software modernization and security services. She led business operations, as well as the information technology governance and information assurance-related services, including certification and accreditation, systems security engineering process improvement, and information assurance strategic planning and programme management. During previous years, Dr Mehan delivered information assurance and security-related privacy services to senior department of defense, federal government, and commercial clients working in Italy, Australia, Canada, Belgium, and the United States. Information security should not be an after thought. It should be ingrained into the organization’s culture. This book will help you create this forward thinking culture using best practices and standards.

Price: $69.95

Click here to buy from Amazon

By

FORCE MULTIPLIER FOR INTELLIGENCE: Collaborative Open Source Networks Report

FORCE MULTIPLIER FOR INTELLIGENCE: Collaborative Open Source Networks Report (Csis Report)As recent events demonstrate, the manifestations of Islamist extremism in Europe are manifold. They range from youngsters who reject both government and academic attempts at multiculturalism to radical imams who influence their congregations against their host countries to fundamentalist converts who believe the West is on a crusade to destroy Islam. Chat rooms on the Internet are used with powerful effect to proselytize, recruit, radicalize, fund raise, train, and plot acts of terrorism. In part to counter violent Islamist extremism, the U.S. National Intelligence Strategy seeks to: (1) develop innovative ways to penetrate and analyze the most difficult targets ; and (2) strengthen analytic expertise, methods, and practices; tap expertise wherever it resides; and explore alternative analytic views. Consequently, the director of national intelligence has given top priority to enhancing outreach to the myriad sources of expertise and open source information that can play a decisive role in countering threats such as terrorism. Over the past year, the CSIS Transnational Threats Project operated and tested a global Trusted Information Network (TIN) devoted to critical threat issues demonstrating that structured interaction with nongovernmental experts on the periphery can provide innovative, alternative analysis and perspectives. Islamist extremism in Europe was explored by the TIN s internationally recognized experts, even as daily events in Europe illustrated that al Qaeda inspired terrorists continue to proliferate among Muslim communities there. TIN members, in a collaborative online setting, contributed fresh information and perceptions about the extremists route to violence and their aspirations. This report reviews the workings of the CSIS network and demonstrates the contribution such a TIN can make as a force multiplier for intelligence in the information age.

Price: $19.95

Click here to buy from Amazon

/* */