Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS

Linked e-resources

Details

Intro; Dedication; Foreword; Preface; About the Study Questions; Acknowledgment; Contents; Chapter 1: Weaponization of Computers; 1.1 Weaponization; 1.2 Weaponizing Computers; 1.3 How Is Weaponizing Done?; 1.4 Who Does It?; 1.5 Implications for Policy and Practice; 1.5.1 Legislative Control; 1.5.2 Malware Marketplaces; 1.5.3 Need for Self-Defence; 1.5.4 Personal Privacy; 1.5.5 Dual-Purpose Weapons; 1.5.6 Business Sector and Non-government Organizations; 1.5.7 Cyber War; 1.5.8 Stateś Obligation to Citizen Protection; 1.5.9 Use in Disrupting Drug Trafficking; 1.5.10 Cyber Counterintelligence

1.6 Cyber-Security Myth1.7 Principal Concepts; 1.8 Study Questions; 1.9 Learning Activity; Reference; Chapter 2: Human Nature and Cyber Weaponry: Use of Denial and Deception in Cyber Counterintelligence; 2.1 Background; 2.2 The Cyber Espionage Threat; 2.3 Counterintelligence Definitions, Status, and Frameworks; 2.4 Cyber Counterintelligence Framework in Active Cyber Defense; 2.5 Cyber Denial and Deception Techniques and Technologies to Enhance Cyber Counterintelligence in Active Cyber Defense; 2.6 Hypothetical Case Study; 2.7 Conclusion; 2.8 Principal Concepts; 2.9 Study Questions

2.10 Learning ActivitiesReferences; Chapter 3: The Human Element: The ``Trigger ́́on Cyber Weapons; 3.1 Introduction; 3.2 Rationale; 3.3 Who; 3.4 How; 3.4.1 Attack Vectors; 3.5 Why; 3.5.1 Identify Vital Information Assets; 3.5.2 Assess Your Vital Information Assets ́Vulnerability; 3.5.3 Vital Information; 3.5.3.1 Basics; 3.5.3.2 IT Infrastructure; 3.5.3.3 Internet of Things; 3.5.3.4 Public Networks and Social Media; 3.5.4 Reinforce Basic Protections; 3.5.5 Improve Awareness; 3.5.6 Act, But Do Not Over React; 3.6 Best Practice; 3.7 Conclusion; 3.8 Principal Concepts; 3.9 Study Questions

3.10 Learning ActivityReferences; Chapter 4: Cyber Defense for IMGs and NGOs Using Crime Prevention Through Environmental Design; 4.1 Background; 4.2 Introduction; 4.3 Role of Social Media in Protest; 4.4 Background to CPTED; 4.5 Developing a Cyber Defence Plan; 4.5.1 Creating the Network; 4.5.2 Gathering Information; 4.5.3 Sending Information; 4.6 Using CPTED; 4.6.1 Surveillance; 4.6.2 Legibility; 4.6.3 Territoriality; 4.6.4 Ownership of the Space; 4.6.5 Management of the Space; 4.6.6 Vulnerability; 4.7 Agent Provocateur; 4.8 Conclusion; 4.9 Principal Concepts; 4.10 Study Questions

4.11 Learning ActivityReferences; Chapter 5: Drinking from a Fire Hydrant: Information Overload As a Cyber Weapon; 5.1 Introduction; 5.2 Cyber War; 5.3 Fog of War; 5.4 Typology; 5.5 X Axis; 5.6 Y Axis; 5.7 Z Axis; 5.8 Conclusion; 5.9 Principal Concepts; 5.10 Study Questions; 5.11 Learning Activity; References; Chapter 6: Archerś Stakes in Cyber Space: Methods to Analyze Force Advantage; 6.1 Introduction; 6.2 Framework One; 6.2.1 Analysing State Deployment of Cyber Weapons; 6.2.2 Case Study One-Operation Orchard; 6.2.3 Analysing Operation Orchard; 6.3 Framework Two

Browse Subjects

Show more subjects...

Statistics

from
to
Export