Inside Cyber Warfare:Mapping the Cyber Underworld(English, Hardcover, Carr Jeffrey) | Zipri.in
Inside Cyber Warfare:Mapping the Cyber Underworld(English, Hardcover, Carr Jeffrey)

Inside Cyber Warfare:Mapping the Cyber Underworld(English, Hardcover, Carr Jeffrey)

Quick Overview

Rs.936 on FlipkartBuy
Product Price Comparison
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare-without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.     Discover how Russian investment in social networks benefits the Kremlin     Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa     Explore the rise of anarchist groups such as Anonymous and LulzSec     Look inside cyber warfare capabilities of nations including China and Israel     Understand how the U.S. can legally engage in covert cyber operations     Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers. About the Author Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies. His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide. Table of Contents Chapter 1 Assessing the Problem     The Complex Domain of Cyberspace     Cyber Crime     Future Threats     The Conficker Worm: The Cyber Equivalent of an Extinction Event?     Africa: The Future Home of the World’s Largest Botnet?     The Way Forward Chapter 2 The Rise of the Nonstate Hacker     The StopGeorgia.ru Project Forum     The Russian Information War     The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead     Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria     Are Nonstate Hackers a Protected Asset? Chapter 3 The Legal Status of Cyber Warfare     Nuclear Nonproliferation Treaties     The Antarctic Treaty System and Space Law     UNCLOS     MLAT     The Law of Armed Conflict     Is This an Act of Cyber Warfare?     Cyber: The Chaotic Domain Chapter 4 Responding to International Cyber Attacks as Acts of War     The Legal Dilemma     The Law of War     Nonstate Actors and the Law of War     Analyzing Cyber Attacks under Jus ad Bellum     The Choice to Use Active Defenses     Conclusion Chapter 5 The Intelligence Component to Cyber Warfare     The Korean DDoS Attacks (July 2009)     One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack     Ingushetia Conflict, August 2009     The Predictive Role of Intelligence Chapter 6 Nonstate Hackers and the Social Web     Russia     China     The Middle East     Pakistani Hackers and Facebook     The Dark Side of Social Networks     TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences     Automating the Process Chapter 7 Follow the Money     False Identities     Components of a Bulletproof Network     The Bulletproof Network of StopGeorgia.ru     SORM-2     The Kremlin and the Russian Internet     A Three-Tier Model of Command and Control Chapter 8 Organized Crime in Cyberspace     A Subtle Threat     Russian Organized Crime and the Kremlin Chapter 9 Investigating Attribution     Using Open Source Internet Data     Team Cymru and Its Darknet Report     Using WHOIS Chapter 10 Weaponizing Malware     A New Threat Landscape Chapter 11 The Role of Cyber in Military Doctrine     The Russian Federation     China Military Doctrine Chapter 12 A Cyber Early Warning Model     The Challenge We Face Chapter 13 Advice for Policymakers from the Field     When It Comes to Cyber Warfare: Shoot the Hostage     The United States Should Use Active Defenses to Defend Its Critical Information Systems     Scenarios and Options to Responding to Cyber Attacks     In Summary     Whole-of-Nation Cyber Security Chapter 14 Conducting Operations in the Cyber-Space-Time Continuum     Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement     Social Networks: The Geopolitical Strategy of Russian Investment in Social Media     Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec Chapter 15 The Russian Federation: Information Warfare Framework     Russia: The Information Security State     Russian Ministry of Defense     Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO)     Russian Federation Ministry of Communications and Mass Communications (Minsvyaz)     Further Research Areas Chapter 16 Cyber Warfare Capabilities by Nation-State     Australia     Brazil     Canada     Czech Republic     Democratic People’s Republic of Korea     Estonia     European Union     France     Germany     India     Iran     Israel     Italy     Kenya     Myanmar     NATO     Netherlands     Nigeria     Pakistan     People’s Republic of China     Poland     Republic of Korea     Russian Federation     Singapore     South Africa     Sweden     Taiwan (Republic of China)     Turkey     United Kingdom Chapter 17 US Department of Defense Cyber Command and Organizational Structure     Summary     Organization Chapter 18 Active Defense for Cyber: A Legal Framework for Covert Countermeasures     Covert Action     Cyber Active Defense Under International Law     Cyber Active Defenses as Covert Action Under International Law     Cyber Attacks Under International Law: Nonstate Actors Colophon