In weniger als einer Minute können Sie mit dem Lesen von Introduction to Cyber-Warfare: A Multidisciplinary Approach auf Ihrem Kindle beginnen. Sie haben noch keinen Kindle? Hier kaufen oder mit einer unserer kostenlosen Kindle Lese-Apps sofort zu lesen anfangen.

An Ihren Kindle oder ein anderes Gerät senden

 
 
 

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 

Introduction to Cyber-Warfare: A Multidisciplinary Approach [Kindle Edition]

Paulo Shakarian , Jana Shakarian , Andrew Ruef

Kindle-Preis: EUR 28,85 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Kostenlose Kindle-Leseanwendung Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.

Geben Sie Ihre E-Mail-Adresse oder Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 28,85  
Taschenbuch EUR 38,47  


Produktbeschreibungen

Pressestimmen

"...an excellent overview of the topic.It looks at the information security aspect of cyberwarfare, as well the military, sociological and other aspects.this book should indeed be read by everyone in Washington, as they are making decisions on the topic, without truly understanding it."--Slashdot.org, RSAConference.com ,August 4 2014

Kurzbeschreibung

  • A multidisciplinary approach to cyber warfare, covering information technology, military, policy, social, and scientific issues
  • Detailed case studies of cyber-attack and cyber-espionage from around the globe, including events linked to hackers in Russia, China, Iran, and others
  • Hacktivism conducted by collectives such as Anonymous and Lulzsec as well as traditional non-state actors such as Hezbollah and Hamas
  • Cyber operations against infrastructure and industry, including Stuxnet and the attack on Aramco
  • Intelligence gathering through malware (including Aurora, Duqu, Flame, and Gauss) and social media (including Linkedin and facebook)

Produktinformation

  • Format: Kindle Edition
  • Dateigröße: 1911 KB
  • Seitenzahl der Print-Ausgabe: 336 Seiten
  • Verlag: Syngress; Auflage: 1 (16. Mai 2013)
  • Verkauf durch: Amazon Media EU S.à r.l.
  • Sprache: Englisch
  • ASIN: B00D6LVZW2
  • Text-to-Speech (Vorlesemodus): Aktiviert
  • X-Ray:
  • Word Wise: Nicht aktiviert
  • Amazon Bestseller-Rang: #432.661 Bezahlt in Kindle-Shop (Siehe Top 100 Bezahlt in Kindle-Shop)

  •  Ist der Verkauf dieses Produkts für Sie nicht akzeptabel?

Mehr über die Autoren

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Kundenrezensionen

Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 3.7 von 5 Sternen  3 Rezensionen
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Provides a great introduction to cyberwarfare 4. August 2014
Von Ben Rothke - Veröffentlicht auf Amazon.com
Format:Taschenbuch
Cyberwarfare is a most controversial topic. At the 2014 MISTI Infosec World Conference, noted security curmudgeon Marcus Ranum gave a talk on Cyberwar: Putting Civilian Infrastructure on the Front Lines, Again. Be it the topic or Marcus being Marcus, a third of the participants left within the first 15 minutes. They should have stayed, as Ranum, agree with him or not, provided some riveting insights on the topic.

While a somewhat broad term, in Wikipedia, cyberwarfare (often called information warfare) is defined as politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare.

The authors define cyber war as an extension of policy by actions taken in cyber space by state or nonstate actors that either constitute a serious threat to a nation’s security or are conducted in response to a perceived threat against a nation’s security.

As to a book on the topic, for most readers, cyberwarfare is something that they may be victims of, but will rarely be an actively part of.

In Introduction to Cyber-Warfare: A Multidisciplinary Approach, authors Paulo Shakarian, Jana Shakarian and Andrew Ruef provide an excellent overview of the topic. The book takes a holistic, or as they call it multidisciplinary, approach to the topic. It looks at the information security aspect of cyberwarfare, as well the military, sociological and other aspects of the topic.

The book is divided into 3 parts and 13 densely packed and extremely well-researched and footnoted chapters, namely:
Part I: Cyber Attack
Chapter 2: Political Cyber Attack Comes of Age in 2007
Chapter 3: How Cyber Attacks Augmented Russian Military Operations
Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East
Chapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia
Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates

Part II: Cyber Espionage and Exploitation
Chapter 7: Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key
Component of Chinese Cyber Strategy
Chapter 8: Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation
Chapter 9: Losing Trust in Your Friends: Social Network Exploitation
Chapter 10: How Iraqi Insurgents Watched U.S. Predator Video—Information Theft on the Tactical Battlefield

Part III: Cyber Operations for Infrastructure Attack
Chapter 11: Cyber Warfare Against Industry
Chapter 12: Can Cyber Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure
Chapter 13: Attacking Iranian Nuclear Facilities: Stuxnet

The book provides numerous case studies of the largest cyberwarfare events to date. Issues around China and their use of cyberwarfare constitute a part of the book. Chapter 7 details the Chinese cyber strategy and shows how the Chinese cyber doctrine and mindset is radically different from that of those in the west.

The book compares the board games of chess (a Western game) and Go (a Chinese game) and how the outcomes and strategies of the games are manifest in each doctrine.

The chapter also shows how the Chinese government outlawed hacking, while at the same time the military identified the best and most talented hackers in China, and integrated them into Chinese security firms, consulting organizations, academia and the military.

One of the more fascinating case studies details the cyber war against the corporate world from China. The book provides a number of examples and details the methodologies they used, in addition to providing evidence of how the Chinese were involved.

For an adversary, one of the means of getting information is via social networks. This is often used in parallel by those launching some sort of cyberwarfare attack. LinkedIn is one of the favorite tools for such an effort. The authors write of the dangers of transitive trust; where user A trusts user B, and user B trusts user C. Via a transitive trust, user A will then trust user C based simply on the fact that user B does. This was most manifest in the Robin Sage exercise.

This was where Thomas Ryan created a fictitious information security professional names Robin Sage. He used her fake identity and profile to make friends with others in the information security world, both commercial, federal and military and he was able to fool even seasoned security professionals. Joan Goodchild wrote a good overview of the experiment here.

In chapter 10, the book details how Iraqi insurgents viewed Predator drones video feeds. Woody Allen said that eighty percent of success is just showing up. In this case, all the insurgents had to do was download the feed, as it was being transmitted unencrypted. Very little cyberwarfare required.

When the drone was being designed, the designers used security by obscurity in their decision not to encrypt the video feed. They felt that since the Predator video feeds were being transmitted on frequencies that were not publically known, no access control, encryption or other security mechanisms would be needed.

The downside is that once the precise frequency was determined by the insurgency, in the case of the Predator drone, the Ku-band, the use of the SkyGrabber satellite internet downloader made it possible for them to effortless view the video feeds.

The only negative about the book is a minor one. It has over 100 pictures and illustrations. Each one states: for the color version of this figure, the reader is referred to the online version of the book. Having that after every picture is a bit annoying. Also, the book never says where you can find the online version of the book.

How good is this book? In his review of it, Krypt3ia said it best when he wrote: I would love to start a kickstarter and get this book into the hands of each and every moron in Congress and the House. The reality is that this book should indeed be read by everyone in Washington, as they are making decisions on the topic, without truly understanding it.

For most readers, this will be the book that tells them everyone they need to know that their congressman should know. Most people will never be involved with any sort of warfare, and most corporate information security professional will not get involved with cyberwarfare. Nonetheless, Introduction to Cyber-Warfare: A Multidisciplinary Approach is a fascinating read about a most important topic.
5 von 7 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Mostly great content, unreadably small Kindle font sizing 5. Juli 2013
Von D. Rosenbauer - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Verifizierter Kauf
Over the past couple of years, I've read most of the IT security books published by Syngress. With only a few minor exceptions, they are uniformly well-written, up to date, and informative. This book was no exception.

The three authors are extremely knowledgeable about their subject matter, and, for the most part, write clearly and concisely. One of the authors is a major in the US Army, one is a private-sector security consultant, and one is an academic researcher. This is truly a "multi-disciplinary approach". The book begins with examples of cyber-incidents, including attacks on Estonia and Georgia (the country) during the late 2000s. After a brief segue through Anonymous and other non-state actors (see below), they get into cyber-espionage and cyber-attacks. Reading through this book during the ongoing NSA scandal helped me see things from the cyber-warfare perspective.

The content is (mostly) impeccable, and if I was rating it on the content alone, I would give it four and a half stars. I'm giving this book three stars instead for two reasons:

First, the chapter I mentioned above, on Anonymous and "hacktivism", was unexpectedly different. Many of the paragraphs read like they'd been cobbled together at the last minute from previously-written, unrelated writings. The author(s) re-introduced and repeatedly cited the same few individuals (specifically the PLF's "Commander X") and organizations a dozen times throughout the chapter, with no sense that they'd already been introduced to the reader earlier. Occasionally, a source would be quoted without identification, and then introduced several pages later. The chapter also has a somewhat uneven scolding tone, as though the author(s) couldn't decide whether to be amused or offended by hacktivists. Since the other chapters were much higher quality, I would recommend that somebody go back and edit Chapter 6 for clarity and consistency.

Second, the Kindle edition was formatted very strangely on both my Paperwhite and Kindle for PC. As you progress through the first few chapters, the paragraph font becomes progressively smaller and smaller. By chapter 8, the paragraph text is small enough that the Kindle's controls won't increase it above the Kindle's absolute minimum font size unless you set it to one of the top three settings. Setting the font to a readable size makes the chapter headings and table of contents so large that only a few words fit on a single page. As a lesser (and maybe related) issue, the whole book appears inside of a gray box, like you'd see used for a call-out section in other Syngress books.

If the publisher updates this book so that the later chapters are readable without 3x reading glasses, I'll update my review to five stars on content alone. Keep up the good work, Syngress.
2 von 4 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Good Compilation of Material - Kindle version Needs to be Fixed 17. August 2013
Von William D. Bryant - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Verifizierter Kauf
This is a very useful compilation of cyber warfare material and helped me a great deal to connect into various resources through good footnotes. The most negative thing about the book is the very poor Kindle formatting (I used the iPad Kindle app.) The font size changes radically from chapter to chapter and some chapters were very difficult to read, even on the maximum font size. Obviously, the formatting needs to be fixed. This would be four stars if the formatting was fixed.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden