eBook Encyclopedia of Cyber Warfare, 1st Edition

  • Paul J. Springer
  • Published By:
  • ISBN-10: 1440844259
  • ISBN-13: 9781440844256
  • DDC: 355.4
  • Grade Level Range: 9th Grade - College Senior
  • 379 Pages | eBook
  • Original Copyright 2017 | Published/Released January 2018
  • This publication's content originally published in print form: 2017
  • Price:  Sign in for price

About

Overview

This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Contents.
List of Entries.
Guide to Related Topics.
List of Documents.
Preface.
Introduction.
A.
1: Advanced Persistent Threat (APT).
2: Air Gapping.
3: Alexander, Keith B..
4: Alperovitch, Dmitri.
5: Al Qaeda.
6: Anonymous.
7: Antivirus Software.
8: Apple Inc..
9: Aramco Attack.
10: ARPANET.
11: Arquilla, John.
12: Assange, Julian.
13: Attribution.
14: Authentication.
B.
15: Baidu.
16: Bitcoin.
17: Black Hat.
18: Blacklist.
19: Botnet.
20: Brenner, Joel F..
21: Bush, George W..
C.
22: Carpenter, Shawn.
23: Cebrowski, Arthur K..
24: Central Intelligence Agency (CIA).
25: Certificates.
26: Clarke, Richard A..
27: Closed Network.
28: Cloud Computing.
29: Code Red Worm.
30: Comprehensive National Cybersecurity Initiative (CNCI).
31: Computer Emergency Response Team (CERT).
32: Conficker Worm.
33: Cray, Seymour.
34: Cryptography.
35: Cyber Attack.
36: Cyber Crime.
37: Cyber Defence Managementauthority (CDMA).
38: Cyber Defense.
39: Cyber-Defense Exercise.
40: Cyber Deterrence.
41: Cyber-Equivalence Doctrine.
42: Cyber Escalation.
43: Cyber Espionage.
44: Cyber Ethics.
45: Cyber Sabotage.
46: Cyber Security.
47: Cyberspace Policy Review (2009).
48: Cyber Terrorism.
49: Cyber War.
50: Cyber Warriors.
51: Cyber Weapon.
D.
52: Dark Web.
53: Deep Web.
54: Defense Advanced Research Projects Agency (DARPA).
55: Defense Information Systems Agency (DISA).
56: Department of Defense (DoD).
57: Department of Energy (DOE).
58: Department of Homeland Security (DHS).
59: Department of Justice (DOJ).
60: Distributed Denial-of-Service (DDoS) Attack.
61: Domain Name System (DNS).
E.
62: E-Commerce.
63: EINSTEIN (Cyber System).
64: Electromagnetic Pulse (EMP).
65: Encryption.
66: Escalation Dominance.
67: Estonian Cyber Attack (2007).
68: Ethernet.
69: Evron, Gadi.
F.
70: Federal Bureau of Investigation (FBI).
71: FireEye.
72: Firewall.
73: Flame Worm.
74: Foreign Intelligence Surveillance Act (FISA).
75: 4Chan.
G.
76: Gates, Bill.
77: Gates, Robert M..
78: Gauss Worm.
79: Georbot.
80: Georgian Cyber Attack (2008).
81: GhostNet.
82: Google.
H.
83: Hacker.
84: Hacktivist.
85: Hardware.
86: Hayden, Michael V..
87: Honeypot.
I.
88: Identity Theft.
89: Iloveyou Virus.
90: Information Warfare Weapons Treaty.
91: Informatization.
92: Infrastructure.
93: Intel Corporation.
94: Intellectual Property.
95: Internet.
96: Internet Corporation for Assigned Names and Numbers (ICANN).
97: Internet Governance.
98: Internet Protocol (IP) Address.
99: Internet Relay Chat (IRC).
100: Internet Service Provider (ISP).
101: Interpol.
102: Iran Cyber Capabilities.
103: Islamic State in Iraq and Syria (ISIS).
104: Israel Cyber Capabilities.
J.
105: JPMorgan Hack.
106: Just War.
107: JWICS Network.
K.
108: Kaspersky Lab.
109: Kaspersky, Yevgeniy “Eugene” Valentinovich.
L.
110: Laws of Armed Conflict.
111: Libicki, Martin C..
112: Live Free or Die Hard.
113: Logic Bomb.
114: Low Orbit Ion Cannon (LOIC).
115: LulzSec.
M.
116: Malware.
117: Mandia, Kevin.
118: Mandiant Corporation.
119: Manning, Bradley.
120: Matrix, The.
121: McAfee.
122: Microsoft Corporation.
123: Microsoft Windows.
124: Minimum Essential Emergency Communications Network (MEECN).
125: Mitnick, Kevin.
126: Moonlight Maze.
127: Moore’s Law.
128: MS Blaster Worm.
129: MyDoom Virus.
N.
130: National Cyber Security Strategy.
131: National Infrastructure Advisory Council (NIAC).
132: National Infrastructure Protection Plan (NIPP).
133: National Institute of Standards and Technology (NIST).
134: National Security Agency (NSA).
135: NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE).
136: Net-Centric Warfare (NCW).
137: Net Neutrality.
138: Neuromancer.
139: Nimda Worm.
140: NIPRNet.
141: North Atlantic Treaty Organization (NATO).
142: North Korea Cyber Capabilities.
O.
143: Obama, Barack.
144: Office of Personnel Management Data Breach.
145: Operation Ababil.
146: Operation Aurora.
147: Operation Babylon.
148: Operation Buckshot Yankee.
149: Operation Cartel.
150: Operation Cast Lead.
151: Operation Night Dragon.
152: Operation Orchard.
153: Operation Payback.
154: Operation Shady RAT.
155: Operation Titan Rain.
P.
156: Panetta, Leon E..
157: Patriotic Hacking.
158: People’s Liberation Army Unit 61398.
159: People’s Republic of China Cyber Capabilities.
160: Phishing.
161: Presidential Decision Directive 63 (1998).
162: President’s Commission on Critical Infrastructure Protection (PCCIP).
163: Prey.
164: PRISM Program.
165: Programmable Logic Controller (PLC).
166: Putin, Vladimir.
Q.
167: Quadrennial Defense Review.
R.
168: RAND Corporation.
169: Red Team.
170: Remote Administration Tool (RAT).
171: Riga Summit.
172: Rogers, Michael S..