Cyber Warfare and Cyber Terrorism, 1st Edition

  • Editor: Lech Janczewski [University of Auckland (New Zealand)]
  • Published By:
  • ISBN-10: 1591409926
  • ISBN-13: 9781591409922
  • Grade Level Range: College Freshman - College Senior
  • 532 Pages | eBook
  • Original Copyright 2007 | Published/Released October 2007
  • This publication's content originally published in print form: 2007

  • Price:  Sign in for price



Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field.

Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.



  • Lech Janczewski [University of Auckland (New Zealand)]

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Table of Contents.
Introduction to Cyber Warfare and Cyber Terrorism.
1: Terms, Concepts, and Definitions.
2: Cyber Terrorism Attacks.
3: Knowledge Management, Terrorism, and Cyber Terrorism.
4: Ten Information Warfare Trends.
5: Bits and Bytes vs. Bullets and Bombs: A New Form of Warfare.
6: Infrastructures of Cyber Warfare.
7: Terrorism and the Internet.
8: Steganography.
9: Cryptography.
10: A Roadmap for Delivering Trustworthy IT Processes.
11: Dynamic Aspects of Cyber Warfare and Cyber Terrorism.
12: An Introduction to Key Themes in the Economics of Cyber Security.
13: Role of FS-ISAC in Countering Cyber Terrorism.
14: Deception in Cyber Attacks.
15: Deception in Defense of Computer Systems from Cyber Attack.
16: Ethics of Cyber War Attacks.
17: International Outsourcing, Personal Data, and Cyber Terrorism: Approaches for Oversight.
18: Network-Based Passive Information Gathering.
19: Electronic Money Management in Modern Online Businesses.
20: The Analysis of Money Laundering Techniques.
21: Spam, Spim, and Illegal Advertisement.
22: Malware: Specialized Trojan Horse.
23: SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases.
24: Human Aspects of Cyber Warfare and Cyber Terrorism.
25: Electronic Surveillance and Civil Rights.
26: Social Engineering.
27: Social Engineering.
28: Behavioral Information Security.
29: Toward a Deeper Understanding of Personnel Anomaly Detection.
30: Cyber Stalking: A Challenge for Web Security.
31: Technical Aspects of Handling Cyber Attacks.
32: Cyber Security Models.
33: Cyber War Defense: Systems Development with Integrated Security.
34: Antispam Approaches Against Information Warfare.
35: Denial-of-Service (DoS) Attacks: Prevention, Intrusion Detection, and Mitigation.
36: Large-Scale Monitoring of Critical Digital Infrastructures.
37: Public Key Infrastructures as a Means for Increasing Network Security.
38: Use of Geographic Information Systems in Cyber Warfare and Cyber Counterterrorism.
39: Use of Remotely Sensed Imagery in Cyber Warfare and Cyber Counterterrorism.
40: Identification, Authorization, and Access Control.
41: Hacking and Eavesdropping.
42: Access Control Models.
43: An Overview of IDS Using Anomaly Detection.
44: Bio-Cyber Machine Gun: A New Mode of Authentication Access Using Visual Evoked Potentials.
45: Content-Based Policy Specification for Multimedia Authorization and Access Control Model.
46: Data Mining.
47: Identification and Localization of Digital Addresses on the Internet.
48: Identification Through Data Mining.
49: Business Continuity.
50: A Model for Emergency Response Systems.
51: Bouncing Techniques.
52: Cyber Forensics.
53: Software Component Survivability in Information Warfare.
54: Taxonomy for Computer Security Incidents.
55: Cyber Warfare and Cyber Terrorism: National and International Responses.
56: Measures for Ensuring Data Protection and Citizen Privacy Against the Threat of Crime and Terrorism: The European Response.
57: EU Tackles Cybercrime.
58: The U.S. Military Response to Cyber Warfare.
59: USA's View on World Cyber Security Issues.
60: ECHELON and the NSA.
61: International Cybercrime Convention.
Compilation of References.
About the Editors.