001433258 000__ 07542cam\a2200709\i\4500 001433258 001__ 1433258 001433258 003__ OCoLC 001433258 005__ 20230309003557.0 001433258 006__ m\\\\\o\\d\\\\\\\\ 001433258 007__ cr\un\nnnunnun 001433258 008__ 201203s2021\\\\gw\\\\\\ob\\\\001\0\eng\d 001433258 019__ $$a1225886787$$a1226594108$$a1228649236$$a1232853046$$a1238201321$$a1241066006$$a1246357333 001433258 020__ $$a303060618X$$q(electronic book) 001433258 020__ $$a9783030606183$$q(electronic bk.) 001433258 020__ $$z3030606171 001433258 020__ $$z9783030606176 001433258 0247_ $$a10.1007/978-3-030-60618-3$$2doi 001433258 035__ $$aSP(OCoLC)1228845978 001433258 040__ $$aUPM$$beng$$erda$$epn$$cUPM$$dOCLCO$$dOCLCQ$$dOCLCF$$dGW5XE$$dYDX$$dERF$$dEBLCP$$dOCLCO$$dGZM$$dSFB$$dDCT$$dN$T$$dOCL$$dSNK$$dOCLCO$$dOCLCQ$$dOCLCO$$dOCLCQ 001433258 049__ $$aISEA 001433258 050_4 $$aQA76.9.A25 001433258 08204 $$a005.8$$223 001433258 1001_ $$aDi Pietro, Roberto$$c(Computer scientist),$$eauthor. 001433258 24510 $$aNew dimensions of information warfare /$$cRoberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci. 001433258 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2021] 001433258 300__ $$a1 online resource 001433258 336__ $$atext$$btxt$$2rdacontent 001433258 337__ $$acomputer$$bc$$2rdamedia 001433258 338__ $$aonline resource$$bcr$$2rdacarrier 001433258 347__ $$atext file 001433258 347__ $$bPDF 001433258 4901_ $$aAdvances in information security,$$x1568-2633 ;$$vvolume 84 001433258 504__ $$aIncludes bibliographical references and index. 001433258 5050_ $$aPreface -- Acknowledgements -- Foreword -- Organization -- Book structure -- 1. Information Disorder -- The new social ecosystem -- Threat: disinformation campaign -- Attacks -- Vaccine hesitancy -- Immigration -- Climate change -- Public naivety -- Alleged political scandals -- Countermeasures -- Low-quality information -- Fake-news detection and removal -- Credibility -- Spreading truth -- Datasets -- Malicious actors -- Social bots -- Fake profiles -- Astroturf -- Spammers -- Sock puppets -- Political memes -- New directions -- Part -- Economy -- State-sponsored Cryptocurrency -- Threat: Collapse of the cryptocurrencies -- Attacks and countermeasures -- Hash Functions -- Open Issues -- Scenario 2: Trust in the Computational Power -- Threat: New Technologies -- Scenario 3: Infrastructure -- Attacks and Countermeasures -- Open Issues -- Towards a State-Sponsored Cryptocurrency -- Bitcoin Limitations -- Develop a State-Sponsored Cryptocurrency -- Scenario 1: Stock market forecasts -- Threat: Information-based manipulation -- A large attack surface -- Attacks and countermeasures -- Open issues and future directions -- Threat: Trade-based manipulation -- Attacks -- Countermeasures -- Open issues and future directions -- Threat: Algorithm-based manipulation -- Algorithms taking over -- Loose cannons on the automation deck -- Attacks -- Countermeasures -- Open issues and future directions -- Other countermeasures -- Threat: Technological bias, divide, and monopoly -- Attacks and countermeasures -- Open issues and future directions -- Scenario 3: Remote stock market -- Threat: Attacks against availability -- Attacks and countermeasures -- Threat: Work-from-home perils -- Attacks -- Countermeasures -- Open issues and future directions -- Scenario 4: Complex financial networks -- Threat: Systemic risk and cascading failures -- Measures of systemic risk -- Economics and finance approaches -- Network approaches -- Countermeasures -- Open issues and future directions. Part -- Infrastructure -- Critical Infrastructure -- Scenario: Cyber Warfare targeting Critical Infrastructures -- Threat: Malware -- Attacks and Countermeasures -- Open Issues and Future Directions -- Scenario: A new Cyber-Physical threat from the sky -- Threat: Drones -- Attacks and Countermeasures -- Open Issues and Future Directions -- Attacks and countermeasures -- Open issues and future directions -- Threat: outsourcing of security -- Attacks and countermeasures -- Trust in the cloud -- Security perimeter -- Confidentiality -- Integrity -- Availability -- Open issues and future directions -- Technical side. 001433258 506__ $$aAccess limited to authorized users. 001433258 520__ $$aThis book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference. 001433258 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 15, 2021). 001433258 650_0 $$aInformation warfare. 001433258 650_0 $$aCyberterrorism$$xPrevention. 001433258 650_0 $$aInformation technology$$xSecurity measures. 001433258 650_0 $$aComputer networks$$xSecurity measures. 001433258 650_0 $$aSocial media$$xSecurity measures. 001433258 650_0 $$aElectronic commerce$$xSecurity measures. 001433258 650_0 $$aComputer security. 001433258 650_6 $$aGuerre de l'information. 001433258 650_6 $$aTechnologie de l'information$$xSécurité$$xMesures. 001433258 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures. 001433258 650_6 $$aMédias sociaux$$xSécurité$$xMesures. 001433258 650_6 $$aCommerce électronique$$xSécurité$$xMesures. 001433258 650_6 $$aSécurité informatique. 001433258 655_0 $$aElectronic books. 001433258 7001_ $$aRaponi, Simone,$$eauthor. 001433258 7001_ $$aCaprolu, Maurantonio,$$eauthor. 001433258 7001_ $$aCresci, Stefano,$$eauthor. 001433258 77608 $$iPrint version:$$z9783030606176 001433258 830_0 $$aAdvances in information security ;$$v84.$$x1568-2633 001433258 852__ $$bebk 001433258 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-60618-3$$zOnline Access$$91397441.1 001433258 909CO $$ooai:library.usi.edu:1433258$$pGLOBAL_SET 001433258 980__ $$aBIB 001433258 980__ $$aEBOOK 001433258 982__ $$aEbook 001433258 983__ $$aOnline 001433258 994__ $$a92$$bISE