Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Preface Foreword Introduction
References
Biography Chapter 1. Cyber Warfare: Here and Now
Information in this Chapter What Is Cyber War? Is Cyber War a Credible Threat? Attribution, Deception, and Intelligence Information Assurance References
I: Cyber Attack
Part I Cyber Attack Chapter 2. Political Cyber Attack Comes of Age in 2007
Information in this Chapter Reliance on Information as a Vulnerability Rudimentary but Effective: Denial of Service Leaving Unwanted Messages: Web Site Defacement Tools for Denial of Service The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack Estonia Is Hit by Cyber Attacks General Response to DDoS Summary Suggested Further Reading References
Chapter 3. How Cyber Attacks Augmented Russian Military Operations
Information in This Chapter The 2008 Russian Cyber Campaign Against Georgia What Is Interesting About the Russian Cyber Campaign Preparing for a Cyber-Capable Adversary Summary Suggested Further Reading References
Chapter 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East
Information in this Chapter Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah “July War” of 2006 Civilians in the Cyber Melee: Operation Cast Lead Summary Suggested Further Reading References
Chapter 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia
Information in This Chapter DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks Silencing Novaya Gazeta and Other Russian Dissidents Iran—How the 2009 Elections Led to Aggressive Cyber Operations Summary References
Chapter 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates
Information in This Chapter “Chaotic” Beginnings: The Chaos Computer Club, CCC The Roots of the Anon—4chan, 7chan, and Other Message Boards How We Are Influenced by 4chan: Memes Anonymous—On Image, Structure, and Motivation Anonymous—External Connections and Spin Offs Your Security Is a Joke: LulzSec Anonymous’ Modus Operandi Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous Software for the Legion: Anonymous Products Summary Suggested Further Reading References
II: Cyber Espionage and Exploitation
Part II Cyber Espionage and Exploitation Chapter 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy
Information in This Chapter Introduction Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine Leveraging Resources Beyond the Military: The Cyber Warriors of China Stealing Information from the U.S. Industrial-Military Complex: Titan Rain Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China Monitoring Dissidents: Gh0stNet Using Legitimate Web Sites for Data Exfiltration: The Shadow Network Cyber War Through Intellectual Property Theft: Operation Aurora An Example of the Current State of the Art: Sykipot Summary Suggested Further Reading References
Chapter 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation
Information in This Chapter Introduction Kernel Mode Rootkits Vulnerabilities in the Operating System Stolen Keying Material Commonalities Between Stuxnet and Duqu Information-Stealing Trojans The Geography of Duqu TDL3 and Other Malware Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss Summary Suggested Further Reading References
Chapter 9. Losing Trust in Your Friends: Social Network Exploitation
Information in This Chapter Introduction Do You Really Know All Your LinkedIn Connections? Imposters in Social Networks Designing Common Knowledge: Influencing a Social Network Summary Suggested Further Reading References
Chapter 10. How Iraqi Insurgents Watched U.S. Predator Video—Information Theft on the Tactical Battlefield
Information in This Chapter Introduction The Predator UAV Hacking the Predator Feed Summary Suggested Further Reading References
III: Cyber Operations for Infrastructure Attack
Part III Cyber Operations for Infrastructure Attack Chapter 11. Cyber Warfare Against Industry
Information in This Chapter Introduction Industrial Control Systems: Critical Infrastructure for Modern Nations Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology How a Cyber Attack Led to Water Contamination: The Maroochy Water Breach Summary Suggested Further Reading References
Chapter 12. Can Cyber Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure
Information in This Chapter Introduction Cyber Attacks Directed Against Power Grids Destroying a Generator with a Cyber Attack: The Aurora Test Taking the Power Grid Offline with Minimal Effort: Attacks Leveraging Network Topology Summary Suggested Further Reading References
Chapter 13. Attacking Iranian Nuclear Facilities: Stuxnet
Information in This Chapter Introduction The Alleged Target: The Natanz Fuel Enrichment Facility How Stuxnet Targets Industrial Control Systems Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant Stuxnet Is a Significant Advancement in Malware Stuxnet Invalidates Several Security Assumptions Implications for the Future Summary Suggested Further Reading References
Conclusion and the Future of Cyber Warfare
References
Appendix I. Chapter 6: LulzSec Hacktivities
References
Appendix II. Chapter 6: Anonymous Timeline
References
Glossary Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion