Academia.eduAcademia.edu

Introduction to Cyber-Warfare: A Multidisciplinary Approach

2013

• Provides a multidisciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. • Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) • Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec • Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent"""

Introduction to Cyber-Warfare A Multidisciplinary Approach Paulo Shakarian, Ph.D. Jana Shakarian Andrew Ruef "For Soldiers and leaders engaging in the ongoing battles of cyberspace, this book will be indispensable." - Lieutenant General (ret.) Charles P. Otstott ISBN: 978-0-12-407814-7 PUB DATE: June 2013 "The most thorough study to date of the many facets of cyber-warfare - for scholars and practitioners alike." - Gerardo I. Simari, Senior Researcher – Dept. of Computer Science, University of Oxford LIST PRICE: $49.95 FORMAT: Paperback PAGES: c. 300 TRIM: 7.5w x 9.25h "A must read for those with an interest in when, how, and why cyber-attacks occur, who is behind them, and how the U.S. a defe d itself.” - V.S. Subrahmanian, Professor – Department of Computer Science, University of Maryland "This book thoroughly explores cases such as Stuxnet, Aurora, and others as if they were military operations. This is an imperative for anyone interested in this new dimensio of arfare.” - Roy Lindelauf, Netherlands Defense Academy http://store.elsevier.com/product .jsp?isbn=9780124078147 KEY FEATURES  Provides a multi-disciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play.  Presents detailed case studies of cyber-attack including inter-state cyber-conflict (RussiaEstonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)  Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec  Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxnet. • Describes the state-of-the-art in intelligence-gathering malware platforms including Duqu, Flame, and Gauss as well as how social media such as Facebook and LinkedIn are also leveraged for this purpose. • Explores acts of cyber-warfare against industry including those against Aramco, Google, and others. DESCRIPTION Cyber Warfare has become a global problem threatening governments, corporations and individuals. This new domain of warfare is not only inhabited by governments such as China, Russia, Iran, and the United States, but a variety of other actors including insurgent groups like Hezbollah and Hamas as well as hacking groups such as Anonymous, LulzSec, and others. According to a recent analysis the global market for Cyber Warfare consulting, product development and protective services will reach a value of $15.9 billion in 2012. This in-depth text on cyber warfare, written by experts on the front lines, explores the cutting edge world of cyber-warfare. TABLE OF CONTENTS Forward by Sushil Jajodia Introduction Chapter 1: Cyber Warfare: Here and Now Part I: Cyber Attack Chapter 2: Political Cyber Attack Comes of Age in 2007 Chapter 3: How Cyber Attacks Augmented Russian Military Operations Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East Chapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates Part II: Cyber Espionage and Exploitation Chapter 7: Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy Chapter 8: Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation Chapter 9: Losing Trust in Your Friends: Social Network Exploitation Chapter 10: How Iraqi Insurgents Watched U.S. Predator Video—Information Theft on the Tactical Battlefield Part III: Cyber Operations for Infrastructure Attack Chapter 11: Cyber Warfare Against Industry Chapter 12: Can Cyber Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure Chapter 13: Attacking Iranian Nuclear Facilities: Stuxnet Conclusion and the Future of Cyber Warfare Appendix I. Chapter 6: LulzSec Hacktivities Appendix II. Chapter 6: Anonymous Timeline Glossary Paulo Shakarian holds a Ph.D. in computer science and is a Major in the U.S. Army. He has written over twenty papers published in scientific and military journals. Previously his work has been featured in The Economist, WIRED, and Popular Science. Jana Shakarian holds a M.A. in sociology and anthropology and has previously worked as a research scientist at the U i ersity of Maryla d’s La oratory for Co putatio al Cultural Dy a i s a d as a i depe de t o sulta t ith the Network Science Center at West Point. Andrew Ruef is a Senior Systems Engineer at the firm Trail of Bits (New York, NY) where he conducts information security analysis. He has nearly a decade of industry experience in computer network security and software engineering.