Atnaujinkite slapukų nuostatas

El. knyga: Global Information Warfare: The New Digital Battlefield, Second Edition 2nd edition [Taylor & Francis e-book]

(Andrew B. Jones is Assistant Headteacher for CPD and Professional Mentoring at The Reach Free School, Hertfordshire, UK),
  • Formatas: 363 pages, 33 Illustrations, black and white
  • Išleidimo metai: 25-Sep-2015
  • Leidėjas: Auerbach Publishers Inc.
  • ISBN-13: 9780429257384
  • Taylor & Francis e-book
  • Kaina: 147,72 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standartinė kaina: 211,02 €
  • Sutaupote 30%
  • Formatas: 363 pages, 33 Illustrations, black and white
  • Išleidimo metai: 25-Sep-2015
  • Leidėjas: Auerbach Publishers Inc.
  • ISBN-13: 9780429257384
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks.

In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens.

Upgrades to the Second Edition Include:





Revised discussions of changes and impacts of global information warfare since 2002 Updated analyses of the capabilities of several nation-states as well as nonstate actors A comprehensive list of incidents that have occurred in the past year to show the scope of the problem of GIW Discussions of post-9/11 governmental changes and shifting priorities with clearer hindsight than was possible in the first edition

The book underscores how hostile countries, business competitors, terrorists, and others are waging information warfare against adversaries, even from across the globe. It describes attacks on information systems through theft, Internet espionage, deception, and sabotage, and illustrates countermeasures used to defeat these threats.

The second edition of Global Information Warfare contains a wealth of information and detailed analyses of capabilities of contemporary information technology and the capabilities of the individuals and groups who employ it in their respective digital wars. It is a crucial source for gaining the best understanding of the current state of information warfare and the most effective ways to counter it.
Forewords to the Second Edition xix
Foreword to the First Edition xxvii
Preface xxix
Acknowledgments xxxi
Authors xxxiii
Introduction xxxv
1 Introduction to Global Information Warfare 1(26)
Possibilities
1(2)
Introduction to Warfare
3(1)
Four Generations of Warfare
4(1)
Introduction to Global Information Warfare
4(3)
Information Warfare Will Flit You in Your Pocketbook
7(2)
Business Is War
9(1)
IW Broadly Encompasses Many Levels and Functions
10(1)
What IW Is...and Is Not
10(5)
Going beyond Three Blind Men Describing an Elephant: IW Terms of Reference
15(7)
Command and Control Warfare (C2W)
17(1)
Defense in Depth
17(1)
Information
17(1)
Information System
18(1)
Information Warfare (IW)
18(2)
Information Operations (10)
20(2)
Information Warfare Is a Powerful Approach for Attaining and Maintaining a Competitive Advantage
22(2)
Coherent Knowledge-Based Operations (CKO)
24(1)
Network-Centric Business (NCB)
24(1)
Knowledge Management (KM)
25(1)
Summary
25(1)
References
26(1)
2 From Information Warfare to Information Operations and Cyber Warfare 27(28)
Description of Information Warfare
28(1)
Current DoD Definition of Information Operations
28(3)
Developing World View
31(1)
Russian View of Information Operations
31(6)
Information Warfare
34(1)
Information Weapons
34(1)
Information Space
35(2)
Chinese View of Information Warfare
37(4)
Cyber Warfare
41(4)
Cyber Warfare Approaches of Some Other Nations
45(1)
Russia
46(1)
China
47(1)
Israel
48(1)
Iran
48(1)
India
49(2)
North Korea
51(1)
Pakistan
52(1)
Summary
52(1)
References
52(3)
3 War Stories from the Digital Battlefield 55(20)
Summary
69(1)
References
70(5)
4 Pre 9/11 75(14)
Information Warfare
80(4)
Cyber Warfare
84(1)
The Chinese View
85(1)
The Russian View
85(1)
Impact of the Attacks on September 11, 2001
86(1)
Summary
87(1)
References
87(2)
5 Effect of 9/11 and US Homeland Security (DHS) 89(30)
The 9/11 Attack
90(1)
Effect of 9/11 on US Government and Homeland Security
90(1)
Reaction to the World Trade Center and Pentagon Attacks
91(2)
US Homeland Security (DHS) Overview
91(1)
Homeland Security Act of 2002
91(2)
Our Mission: Overview
93(1)
The Core Missions
93(20)
Department Components
95(1)
US Citizenship and Immigration Services
95(3)
US Customs and Border Protection
98(1)
US Coast Guard
98(1)
Federal Emergency Management Agency
98(1)
Federal Law Enforcement Training Center
98(1)
US Immigration and Customs Enforcement
98(1)
Transportation Security Administration
98(1)
US Secret Service
98(4)
Management Directorate
102(1)
National Protection and Programs Directorate
102(1)
Science and Technology Directorate
102(7)
Domestic Nuclear Detection Office
109(1)
Office of Health Affairs
109(1)
Office of Intelligence and Analysis
109(1)
Office of Operations Coordination and Planning
109(1)
Office of Policy
109(4)
Air Force Information Warfare Center
113(4)
Summary
117(1)
References
117(2)
6 Nation-State Defensive and Offensive Information Warfare Capabilities: North America 119(28)
Canada
119(4)
Doctrine and Strategy
119(2)
Defensive
121(1)
Communications Security Establishment Canada
121(1)
Canadian Cyber Incident Response Centre
121(1)
Canadian Armed Forces
122(1)
Canadian Forces Information Operations Group
122(1)
Canadian Forces Network Operations Centre
122(1)
Canadian Forces Electronic Warfare Centre
122(1)
Offensive
122(1)
Research and Development
122(1)
Defence Research and Development Canada
122(1)
Exercises
123(1)
Cyber Storm Biannual Exercise Series
123(1)
United States
123(23)
Doctrine and Strategy
123(1)
New Strategy
123(3)
Defensive
126(1)
Offensive
127(1)
Known Units
127(5)
Army Cyber Command
127(2)
Navy Information Operations Organizations
129(1)
Air Force Intelligence, Surveillance and Reconnaissance Agency
130(2)
Research and Development
132(4)
The US Army 1st Information Operations Command
133(1)
Joint Special Operations University (JSOU)
133(1)
United States Army Communications-Electronics Research, Development and Engineering Center (CERDEC)
134(1)
Air Force Institute of Technology Center for Cyberspace Research (CCR)
134(2)
US Air Force Air War College (AWC), Air University
136(6)
Civilian Universities
142(2)
Exercises
144(3)
Exercise Combined Endeavor Series
144(1)
Cyber Guard Exercise Series
145(1)
Cyber Flag Exercise Series
145(1)
Cyber Shield Exercise Series
145(1)
Cyber Storm Exercise Series
146(1)
References
146(1)
7 Nation-State Defensive and Offensive Information Warfare Capabilities: Middle East Nation-States 147(10)
Iran
147(4)
Policy and Strategy
147(1)
Defense
148(1)
Passive Civil Defense Committee
148(1)
Cyber Defense Command
148(1)
Police
148(1)
Offensive
149(1)
Iran's Cyber Army
149(1)
Basij Paramilitary Force
149(1)
Research and Development
150(1)
Universities
150(1)
Exercises
151(1)
Israel
151(4)
Policy and Strategy
151(2)
Defensive
153(1)
National Cyber Defense Authority
153(1)
National Information Security Authority
153(1)
Computer Services Directorate's (Lotem) (Telecommunications and Information Technology Unit)
153(1)
Offensive
154(1)
Israel Defense Forces (IDF) Unit 8200
154(1)
Research and Development
154(1)
Israeli Cyber Experimentation Center
154(1)
Institute for National Security Studies (INSS)
155(1)
Exercise Lights Out
155(1)
References
155(2)
8 Nation-State Defensive and Offensive Information Warfare Capabilities: Asia Pacific Region 157(28)
Australia
157(5)
Policy and Strategy
157(2)
Defensive
159(2)
Australian Security Intelligence Organisation
159(1)
Cyber Security Operations Centre
159(1)
Australian Cyber Security Centre (ACSC)
160(1)
Offensive
161(1)
Royal Australian Air Force (RAAF) Aerospace Operational Support Group
161(1)
Research and Development
161(1)
Defence Science and Technology Organisation
161(1)
DSTO Cyber and Electronic Warfare Division
162(1)
Exercises
162(1)
China
162(9)
Doctrine and Strategy
162(1)
Defensive
163(1)
Research and Development
164(2)
The Academy of Military Sciences
164(1)
National Defense University
165(1)
Wuhan Communications Command Academy
165(1)
National University of Defense Technology
165(1)
Information Engineering University
166(1)
Research Funding Programs
166(2)
Offensive
168(1)
Known Units
168(2)
Technical Reconnaissance Bureaus (TRB)
169(1)
Information Warfare Militia
169(1)
Exercises
170(1)
India
171(5)
Policy and Strategy
171(1)
Defensive
172(1)
Data Security Council of India
173(1)
Defence Information Assurance and Research Agency (DIARA)
173(1)
Defense Intelligence Agency
173(1)
Offensive
173(1)
Territorial Army (TA) Battalions for Cyber Warfare
173(1)
Indian Cyber Army
174(1)
Research and Development
174(1)
Military College of Telecommunications Engineering (MCTE)
174(1)
The Prabhu Goel Research Centre for Computer and Internet
Security
174(1)
Cyber Laboratories Program
174(1)
Exercises
175(1)
APCERT Annual Drill
175(1)
North Korea
176(4)
Policy and Strategy
176(1)
Defensive
177(1)
Offensive
177(1)
Ministry of People's Armed Forces
177(2)
Research and Development
179(1)
Exercises
180(1)
Operation Troy
180(1)
Kimsuky Campaign
180(1)
Pakistan
180(2)
Policy and Strategy
180(1)
Defensive
181(1)
Pakistan National Response Center for Cyber Crime
181(1)
Inter-Services Intelligence Directorate
181(1)
Offensive
181(1)
Pakistan Cyber Army
181(1)
Research and Development
182(1)
References
182(3)
9 Nation-State Defensive and Offensive Information Warfare Capabilities: Europe 185(18)
France
185(5)
Policy and Strategy
185(2)
Defensive
187(1)
Offensive
188(1)
Research and Development
189(1)
Universities
189(1)
Exercises
190(1)
Germany
190(3)
Policy and Strategy
190(1)
Defensive
191(1)
Alliance for Cyber Security
191(1)
Offensive
192(1)
Strategic Reconnaissance Command
192(1)
Research and Development
192(1)
Exercises
193(1)
Exercise LUKEX 11
193(1)
Exercise Cyber Coalition 2013
193(1)
Exercise Steadfast Jazz 2013
193(1)
Exercise Combined Endeavor 2014
193(1)
United Kingdom
193(9)
Policy and Strategy
193(3)
Defense
196(2)
Centre for the Protection of National Infrastructure (CPNI)
196(1)
Land Information Assurance Group
196(2)
Offensive
198(1)
Research and Development
199(2)
Defence Science and Technology Laboratory (DSTL)
199(1)
DSTL Also Runs the Centre for Defence Enterprise (CDE)
199(2)
Exercises
201(1)
References
202(1)
10 Nation-State Defensive and Offensive Information Warfare Capabilities: The Russian Federation 203(14)
Russian Federation
203(10)
Policy and Strategy
203(2)
Defensive
205(2)
The Federal Security Service (Federal'naya Sluzhba Bezopasnosti) (FSB)
205(1)
Information Security Centre of the FSB, Military Unit (VCH) 64829
205(1)
Ministry of Foreign Affairs: Department of Information Security
205(1)
RU-CERT
206(1)
Center for Information Technology and Systems of Executive Agencies
206(1)
Department for Combatting Crimes in the High Technology Sphere (Directorate K)
206(1)
Ministry of Internal Affairs: Department for Combating Extremism
207(1)
Center for Licensing, Certification and Protection of State Secrets (FSB)
207(1)
Offensive
207(2)
Foreign Intelligence Service (Sluzhba Vneshney Razvedki)
208(1)
Advanced Persistent Threat No. 28 (APT28)
209(1)
Russian Business Network
209(1)
Research and Development
209(4)
Strategic Rocket Forces Academy: Department of Electronic and Information Warfare
209(1)
National Research Nuclear University: Moscow Engineering Physics Institute
210(1)
Federal Protection Service (FSO) Academy
210(1)
Moscow State Technical University (Bauman): Department of Information and Control Systems
210(1)
Academy of the FSB: Institute of Cryptography, Telecommunications and Computer Science (IKSI)
210(1)
The Federal Service for Technical and Export Control
210(1)
Center for Special Development Ministry of Defense of the Russian Federation
211(1)
4th Central Research Institute of the Ministry of Defense
211(1)
18th Central Research Institute of the Ministry of Defense
212(1)
27th Central Scientific Research Institute of the Ministry of Defense
212(1)
Federal State Unitary Enterprise Scientific-Technical Center "Orion" of the FSB
212(1)
Russia State Humanities University: Faculty of Information Security
213(1)
Operations and Exercises
213(2)
Estonia
213(1)
Georgia
214(1)
Ukraine
214(1)
References
215(2)
11 International Organizations' Defensive and Offensive Information Warfare Capabilities 217(8)
European Union
217(2)
Policy and Strategy
217(1)
Defensive
218(1)
Offensive
218(1)
Research and Development
218(1)
European Defence Agency (EDA)
218(1)
Exercises
219(1)
Cyber Europe Exercise Series
219(1)
NATO
219(4)
NATO Policy on Cyber Defense
220(1)
NATO Cyber Range
220(1)
NATO Smart Defence Initiative
220(1)
NATO Computer Incident Response Capability (NCIRC)
220(1)
NATO Communications and Information Systems School
220(1)
NATO School in Oberammergau
221(1)
NATO Defence College
221(1)
NATO Communications and Information Agency
221(1)
NATO Exercises
221(2)
Exercise Baltic Cyber Shield 2010
221(1)
Exercise Locked Shields 2012
222(1)
Exercise Locked Shields 2013
222(1)
Exercise Locked Shields 2014
222(1)
Cyber Coalition Exercises
223(1)
International Exercises
223(32)
Cyber Europe 2010
223(1)
Exercise Cyber Atlantic 2011
223(1)
Summary
223(1)
Reference
224(1)
12 Nonstate Actors 225(16)
Individuals and Groups
225(1)
Information Warfare Tactics by Miscreants in General
225(4)
The Harsher Side of Activism
229(1)
Terrorists
229(1)
9/11/01: A Date in Infamy
230(1)
Information Warfare Tactics by Terrorists
230(1)
What Do They Want to Achieve?
231(1)
Tactics
232(1)
Data Hiding
232(2)
Cryptography
234(1)
Propaganda
235(1)
DoS
235(1)
What Is a DoS Attack?
235(1)
Impact
236(1)
Types of Attack
236(1)
Destruction or Alteration of Configuration Information for a System or Network
236(1)
Consumption of Precious Resources
237(1)
Physical Destruction or Modification of Network Elements
237(1)
Organized Criminal Groups
238(1)
Information Warfare Tactics by Activists
239(1)
Summary
240(1)
References
240(1)
13 The History of Technology 241(26)
What Is Technology?
242(1)
From Cave Warrior to Information Warrior
243(1)
From the Twentieth Century to Today: Technology and the Advent of High Technology
244(2)
Other Significant Twentieth-Century Technological Developments and Events
246(1)
What Is High Technology?
247(1)
High-Tech: A Product, a Process, or Both?
247(1)
The Trade Association: AEA
248(1)
The Consulting Group: RFA
248(1)
Information Provider: One Source
248(1)
The Research Group: BLS
249(1)
The Microprocessor
249(1)
Moore's Law
250(1)
Other Significant Twentieth-Century High-Technology Developments and Events
251(1)
The Internet
252(3)
The High-Technology-Driven Phenomenon
255(1)
Internet Service Providers
255(1)
Faster and More Massive High-Technology-Driven Communications
256(3)
The Beneficial Effect of Hacker Tools and Other Malicious Software on Network Security with Dual Roles as IW Tools
257(31)
Hacker Tools
257(1)
Viruses
257(1)
Worms
258(1)
Easter Eggs
258(1)
Trojan Horses
259(1)
Logic Bombs
259(1)
Other High-Technology Tools in IW
259(2)
Welcome to Twenty-First-Century Technology
261(1)
Summary
262(2)
References
264(3)
14 Corporate and National Resilience 267(20)
Big Data
268(2)
Cloud Computing
270(4)
How Do Organizations Reduce the Risks?
274(1)
Service Level Agreements (SLAB)
274(1)
Data Encryption
275(1)
Sensitive Data
275(1)
Business Continuity
275(1)
Layered Security
275(1)
Data Destruction
275(1)
Data Breaches in the Cloud: Who Is Responsible?
276(1)
What Do You Do in the Event of a Breach?
276(1)
Internet of Things (Also Known as the Internet of Everything)
277(1)
Cyber Physical Systems (CPS)
277(1)
Smart Grids
278(1)
Advanced Persistent Threat (APT)
279(1)
How Do You Make Your Organization More Resilient?
280(1)
Defense in Depth
281(1)
Improved Detection
281(1)
Employee Security Awareness
282(1)
Organized Crime
282(1)
Terrorism
283(1)
Impact on Nation-States
284(1)
Impact on Corporations
284(1)
Summary
285(1)
References
285(2)
15 Awareness 287(12)
Definitions to Consider
287(1)
Establishing and Managing a GIW Awareness Program
288(3)
On a Nation-State Level
288(1)
On a Business Level
289(1)
On a Group or Association Level
289(1)
On a Personal Level
289(1)
An Awareness Program Incorporating GIW Aspects
290(1)
Profile of an Awareness Program
290(1)
Measuring the Cost and Effectiveness of an Awareness Program
291(6)
Example of a Security Education and Awareness Training
291(1)
SEATP Drivers and Flowcharts
292(1)
SEATP Metrics
293(1)
Data Collection and Metrics Management
294(3)
Case Study
297(1)
Summary
298(1)
References
298(1)
16 The Tallinn Manual 299(20)
Summary
317(1)
References
317(2)
17 A Look at the Future: The Crystal Ball 319(12)
Surviving into the Future
321(1)
New-Old Approach to Security: Defensive IW
322(1)
The Changing Environment
322(1)
The Need for Enlightened and Dedicated Leadership
322(5)
Global Trends
323(4)
Impact of Globalization
324(1)
New Challenges to Governance
325(1)
Pervasive Insecurity
325(1)
Transmuting International Terrorism
326(1)
Policy Implications
326(1)
Offensive-Defensive GIW Attacks
327(1)
The Future of the Internet
327(2)
Summary
329(1)
References
330(1)
Appendix 331(8)
Index 339
Andy Jones has more than 40 years of military, government, business, and academic experience in the areas of intelligence, security, and digital forensics, both in the United Kingdom and overseas. He has been a practitioner for the whole period and a researcher in these areas for more than 20 years. He is currently an academic, international consultant, lecturer, and writer and is involved in research with a number of universities in the United Kingdom and Australia.

Gerald L. Kovacich has over 45 years of experience in industrial, business, and government security, investigations, intelligence/counterintelligence, source handling, information systems security, and information warfare, both in the US government as a special agent and in international corporations and subsequently as an international consultant and lecturer. He retired from his position as the information warfare technologist at Northrop Grumman Corporation to pursue a career as an international consultant, lecturer, and writer.