Atnaujinkite slapukų nuostatas

El. knyga: Counterterrorism and Cybersecurity: Total Information Awareness

3.83/5 (12 ratings by Goodreads)
  • Formatas: PDF+DRM
  • Išleidimo metai: 07-Apr-2015
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783319172446
  • Formatas: PDF+DRM
  • Išleidimo metai: 07-Apr-2015
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783319172446

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism.

In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed.

The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace.

Recenzijos

The second edition of this book presents a comprehensive account of past and current initiatives in the field of total information awareness, examining history, strategies, and technologies with a thought-provoking approach that will appeal to both technical and nontechnical readers. This is a very rich, accurate, and well-documented book, full of references to press sources, which can help in getting a sense of how many initiatives, concerns, and approaches exist in the field of counterterrorism and cybersecurity. (Alessandro Berni, Computing Reviews, October, 2015)

Part I Counterterrorism History: Then and Now
1 September 11 Attacks
3(18)
1.1 September 11, 2001
3(3)
1.2 Disney's Responses to the 9/11 Attacks
6(1)
1.3 FBI Warning of Hollywood as a Terrorist Target
7(1)
1.4 Holly wood Realism on Terrorism
8(1)
1.5 A New Day of Infamy and America at War
9(3)
1.6 September 11, 2012
12(1)
1.7 Sony-pocalypse: Invoking 9/11 Attacks in Cyber Terrorism
12(9)
Bibliography
16(5)
2 U.S. Intelligence Community
21(24)
2.1 "Need to Know" --- Truths, Half Truths, and Lies
21(2)
2.2 FBI Ten Most Wanted Fugitive: Osama Bin Laden
23(2)
2.3 An American Hero Born in Lebanon
25(1)
2.4 The FBI-CIA Bureaucratic Rivalries
26(2)
2.5 Operational Failures of the U.S. Intelligence Community
28(1)
2.6 Unity of Counterterrorism Effort Across U.S. Government
29(2)
2.7 Transition from Need-to-Know to Need-to-Share and Need-to-Provide
31(3)
2.8 Informed Interrogation Approach
34(1)
2.9 U.S. Fusion Centers
35(1)
2.10 International Collaboration on Counterterrorism
36(1)
2.11 Hard Lessons from Pearl Harbor and 9/11
37(8)
Bibliography
39(6)
Part II Counterterrorism Strategies: Causes and Cures, War and Peace
3 Understanding Terrorism
45(28)
3.1 "Give a Human Face to People We Consider Our Enemies" --- The Americans
46(2)
3.2 Bravery and Cowardice
48(1)
3.3 Drones Kill Terrorists, not Terrorism
49(3)
3.4 War on Terror (Overseas Contingency Operation)
52(1)
3.5 A Stubborn Terror
53(2)
3.6 Economic and Psychological Warfare
55(3)
3.7 Inside the Minds of Terrorists and Their Sympathizers
58(4)
3.8 Questioning Terrorism and Destroying Stereotypes
62(11)
Bibliography
64(9)
4 Cures for Terrorism
73(34)
4.1 Terrorism as a Disease
73(2)
4.2 "Revenge Is Sour" --- George Orwell
75(3)
4.3 "Govern Your Passions or They Will Be Your Undoing" --- Mr. Spock
78(1)
4.4 "Impossible to Carry a Grudge and a Big Dream at the Same Time" --- Unknown
79(1)
4.5 "Every Truth Has Two Sides" --- Aesop
80(2)
4.6 "Give Everyone a Voice" --- Mark Zuckerberg
82(2)
4.7 "The Only Security of All Is in a Free Press" --- Thomas Jefferson
84(2)
4.8 "Free Speech Would not Protect a Man Falsely Shouting Fire" --- Oliver Wendell Holmes, Jr.
86(2)
4.9 "198 Methods of Nonviolent Action" --- Gene Sharp
88(8)
4.10 "We Do not Have the Right to Resort to Violence When We Don't Get Our Way" --- President Bill Clinton
96(2)
4.11 "Peace Is the Only Path to True Security" --- President Barack Obama
98(9)
Bibliography
99(8)
5 War and Peace
107(28)
5.1 War as State-Sponsored Terrorism
108(1)
5.2 Complacency in War
109(1)
5.3 The Warrior's Code
110(1)
5.4 Civilians Wanting Peace
111(1)
5.5 Peace Entailing Sacrifice
112(3)
5.6 Attainable Peace
115(2)
5.7 A Just and Lasting Peace
117(2)
5.8 Peace and Friendships on Facebook
119(3)
5.9 One Small Step for an Individual; One Giant Leap for Humankind
122(4)
5.10 A Recipe for Peace
126(9)
Bibliography
128(7)
Part III Counterterrorism Technologies: Total Information Awareness
6 The Rise and Fall of Total Information Awareness
135(16)
6.1 President Ronald Reagan and Admiral John Poindexter
135(1)
6.2 Defense Advanced Research Projects Agency (DARPA)
136(1)
6.3 Information Awareness Office (IAO)
137(1)
6.4 Perception of Privacy Invasion
138(1)
6.5 Privacy Protection in Total Information Awareness (TIA)
139(2)
6.6 Opposing Views on TIA
141(2)
6.7 Demystifying IAO and TIA
143(2)
6.8 Demise of IAO and TIA
145(6)
Bibliography
147(4)
7 The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks
151(32)
7.1 NSA's Terrorist Surveillance Program
152(1)
7.2 President George W. Bush and NSA Warrantless Wiretapping
153(2)
7.3 Poindexter's Policy Analysis Market
155(1)
7.4 Project Argus: Bio-surveillance Priming System
155(1)
7.5 President Barack Obama's Big Data R&D Initiative
156(1)
7.6 Palantir Technologies Funded by CIA's in-Q-Tel
157(1)
7.7 Microsoft and NYPD's Domain Awareness System
158(1)
7.8 NSA's Utah Data Center: A $1.5 Billion Data-Mining and Spy Center
158(3)
7.9 Global Surveillance and Abuse of Power
161(1)
7.10 Edward Snowden's NSA Leaks and PRISM
162(11)
7.11 Social Networks' Responses to NSA Leaks and PRISM
173(3)
7.12 Reform Government Surveillance and Reset the Net
176(7)
Bibliography
177(6)
8 A Two-Way Street of Total Information Awareness
183(18)
8.1 It's a Small World, with CCTVs
183(1)
8.2 Facebook Nation: Total Information Awareness
184(2)
8.3 Surveillance Satellites, Tracking Devices, Spy ware, and Drones
186(3)
8.4 A Two-Way Street of Total Information Awareness
189(2)
8.5 No Doomsday for the Internet
191(1)
8.6 Web 2.0 for Intelligence Community: Intellipedia, A-Space, Deepnet
192(9)
Bibliography
193(8)
Part IV Cybersecurity: History, Strategies, and Technologies
9 Cyber Warfare: Weapon of Mass Disruption
201(48)
9.1 Weapon of Mass Disruption
202(1)
9.2 Financial Disruption
203(3)
9.3 Infrastructure Disruption
206(5)
9.4 Government and Military Disruption
211(4)
9.5 Shodan and the Internet of Things
215(2)
9.6 Backdoors and Counterfeit Parts
217(2)
9.7 Proliferation of Cyber Weapons and Reverse Engineering
219(1)
9.8 Cyber Espionage and Escalation of Cyber Warfare
220(3)
9.9 Cyber Cold War
223(1)
9.10 Psychological Cyber Warfare
224(1)
9.11 Cyber Terrorism and Digital Pearl Harbor
225(2)
9.12 Sony-pocalypse: from Cyber Attacks to Cyber Terrorism
227(4)
9.13 Good, Bad --- Internal/External --- People Put an End to Business as Usual
231(18)
Andy Marken
Bibliography
238(11)
10 Cyber Attacks, Prevention, and Countermeasures
249(38)
10.1 Cybersecurity Acts
250(1)
10.2 Cybersecurity Initiatives: CNCI, NICE, Presidential Executive Order
251(1)
10.3 National Cyber Security Awareness Month (NCSAM)
252(1)
10.4 Mitigation from Denial of Service (DoS, DDoS, DRDoS) Attacks
253(2)
10.5 Data Breach Prevention
255(7)
10.6 Fighting Back Against Phishing and Spoofing
262(2)
10.7 Password Protection and Security Questions
264(3)
10.8 Software Upgrades and Security Patches
267(1)
10.9 Fake Software and Free Downloads
268(2)
10.10 Smartphone Security Protection
270(4)
10.11 Cybersecurity Awareness: Everyone's Responsibility
274(13)
Bibliography
276(11)
11 Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message
287(14)
Ray Balut
Jean C. Stanford
11.1 Introduction
287(1)
11.2 Healthcare Cyber Attacks
288(1)
11.3 Value of Medical Data to Cybercriminals
288(1)
11.4 Major Threats to Medical Data in Clinical Environments
289(1)
11.5 Training Resources
290(1)
11.6 Training Users to Prevent Cyber Breaches
291(1)
11.7 User Communities and Current Training Methods
292(3)
11.8 Types of Training Offered and Training Environment
295(2)
11.9 Innovative Approaches
297(2)
11.10 Conclusion
299(2)
Bibliography
299(2)
12 Plan X and Generation Z
301(22)
12.1 Plan X: Foundational Cyberwarfare
302(4)
12.2 Cyber Battlespace Research and Development
306(2)
12.3 National Centers of Academic Excellence in Cyber Operations
308(1)
12.4 Generation Z, Teen Hackers, and Girl Coders
309(4)
12.5 DEF CON Diversity Panel and IT Girls 2.0
313(1)
Emily Peed
12.6 Control the Code, Control the World
314(9)
Bibliography
316(7)
Part V Cybersecurity: Applications and Challenges
13 Artificial Intelligence and Data Mining
323(20)
13.1 Artificial Intelligence: From Hollywood to the Real World
323(2)
13.2 Intelligent CCTV Cameras
325(1)
13.3 Data Mining in the Age of Big Data
326(1)
13.4 Knowledge Representation, Acquisition, and Inference
327(2)
13.5 Dynamic Mental Models
329(1)
13.6 Modeling Human Problem Solving
330(1)
13.7 Structural Topology and Behavioral Causality
331(1)
13.8 Component Clustering and Decoupling
331(1)
13.9 Analytical Models and Experiential Knowledge
332(1)
13.10 The DM2 Algorithm
332(4)
13.11 AI Applications in Counterterrorism
336(1)
13.12 Massively Multi-Participant Intelligence Amplification (MMPIA)
337(6)
Bibliography
338(5)
14 Gamification of Penetration Testing
343(6)
Darren Manners
14.1 Win, Lose, or Something Else
343(1)
14.2 Short and Long Engagements
344(1)
14.3 A Game Already?
344(2)
14.4 The Future: Continuous Penetration Testing
346(3)
Bibliography
347(2)
15 USB Write Blocking and Forensics
349(80)
Philip Polstra
15.1 Introduction
349(1)
15.2 Brief History
349(1)
15.3 Hardware
350(1)
15.4 Software
350(5)
15.5 Summary of USB Basics
355(1)
15.6 USB Mass Storage Basics
355(5)
15.7 Making Forensics Images and Duplicates
360(10)
15.8 Blocking USB Writes
370(36)
15.9 USB Impersonation
406(13)
15.10 Leveraging Open Source
419(8)
15.11 BadUSB
427(2)
16 DARPA's Cyber Grand Challenge (2014--2016)
429(28)
16.1 Cyber Grand Challenge Kick-off
429(6)
16.2 Costly Software Bugs
435(2)
16.3 Disastrous Arithmetic Errors
437(1)
16.4 DEF CON Capture the Flag
438(1)
16.5 DESCARTES (Distributed Expert Systems for Cyber Analysis, Reasoning, Testing, Evaluation, and Security)
438(10)
16.6 DESCARTES Overview
448(5)
16.7 DESCARTES Automation Strategy
453(1)
16.8 The DESCARTES Chronicle
454(3)
Bibliography
455(2)
Index 457
Newton Lee is CEO of Newton Lee Laboratories LLC, president of the Institute for Education, Research and Scholarships, adjunct professor at Woodbury University's School of Media, Culture & Design and editor-in-chief of ACM Computers in Entertainment. Previously, he was a computer scientist at AT&T Bell Laboratories, senior producer and engineer at The Walt Disney Company, and research staff member at the Institute for Defense Analyses. Lee graduated Summa Cum Laude from Virginia Tech with a B.S. and M.S. degree in Computer Science, and he earned a perfect GPA from Vincennes University with an A.S. degree in Electrical Engineering and an honorary doctorate in Computer Science. He is the co-author of Disney Stories: Getting to Digital; author of the Total Information Awareness book series including Facebook Nation and Counterterrorism and Cyber security; coauthor/editor of the Digital Da Vinci book series including Computers in Music and Computers in the Arts and Sciences and editor-in-chief of the Encyclopedia of Computer Graphics and Games.