Information Warfare and Security
暫譯: 資訊戰與安全
Dorothy E. Denning
- 出版商: Addison Wesley
- 出版日期: 1998-12-20
- 售價: $686
- 語言: 英文
- 頁數: 544
- 裝訂: Paperback
- ISBN: 0201433036
- ISBN-13: 9780201433036
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$580$458 -
$680$537 -
$948Real World Linux Security: Intrusion Prevention, Detection and Recovery
-
$199Information Warfare: How to Survive Cyber Attacks
-
$980$774 -
$700Incident Response: A Strategic Guide to Handling System and Network Security Bre
-
$520$406 -
$920$727 -
$1,120$1,098 -
$1,520Linux System Security, 2/e
-
$650$429 -
$690$587 -
$750$638 -
$560$476 -
$1,068Fundamentals of Database Systems, 4/e (IE)
-
$480$379 -
$490$382 -
$999Physically Based Rendering: From Theory to Implementation (Hardcover)
-
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$580$452 -
$750$638 -
$680$646 -
$650$507 -
$450$356 -
$2,230$2,119
相關主題
商品描述
Description
This book provides a comprehensive and detailed look at information warfare: computer crime, cybercrime, and information terrorism. It describes attacks on information systems through theft, deception, or sabotage, and demonstrates the countermeasures being mounted to defeat these threats. Focusing on the criminals and information terrorists whose depredations include information-based threats to nations, corporations, and individuals, Denning places cybercrime within a broader context, integrating the various kinds of information crime, and the countermeasures against it, into a methodology-based framework.
Among the topics included are government use of information warfare for law enforcement investigations and for military and intelligence operations; also, the conflicts arising in the areas of free speech and encryption. The author discusses offensive information warfare, including acquisition of information, deceptive exploitation of information, and denial of access to information; and also addresses defensive information warfare, specifically, information security principles and practices. The book features coverage that is both broad and deep, illustrating cyberspace threats with real-world examples.
Table Of Contents
I. INTRODUCTION.
Information Warfare.
2. A Theory of Information Warfare.
Players.
The Defense.
A Dual Role.
Offensive Information Warfare.
Decreased Availability to Defensive Player.
Decreased Integrity.
Other Classification Schemes.
Defensive Information Warfare.
Information Security and Information Assurance.
The CIA Model and Authorization.
3. Playgrounds to Battlegrounds.
Culture.
More than Child's Play.
Crime.
Fraud.
Computer Fraud and Abuse.
Fighting Crime.
Individual Rights.
National Security.
War and Military Conflict.
Terrorism.
Netwars.
Protecting National Infrastructures.
II. OFFENSIVE INFORMATION WARFARE.
Privacy.
Web Browsing.
Privacy Regulations.
Piracy.
Trademark Infringement.
Dark Sides.
5. Psyops and Perception Management.
Fabrication.
Hoaxes.
Social Engineering.
Denouncement.
Defamation.
Harassment.
Advertising.
Spam Wars.
Censorship.
6. Inside the Fence.
Economic Espionage.
Corporate Espionage.
Privacy Compromises.
Business Relationships.
Visits and Requests.
Fraud and Embezzlement.
Data Diddling.
Inside Sabotage.
Software Attacks.
Penetrating the Perimeter.
Search and Seizure.
Dumpster Diving.
Bombs.
7. Seizing the Signals.
Pager Intercepts.
Law Enforcement Wiretaps.
Foreign Intelligence Intercepts.
Deciphering the Messages.
Traffic Analysis.
Location Tracking.
Telecommunications Fraud.
PBX and Related Fraud.
Voice Mail Fraud.
Calling Card Fraud.
Cloned Phones and Cellular Fraud.
Computer Network Monitoring.
Keystroke Monitoring.
Environment Surveillance.
Satellites and Imagery.
Van Eck Receptors.
Miscellaneous Sensors.
Shoulder Surfing.
Privacy and Accountability.
Sabotage.
Jamming.
Radio Frequency Weapons.
Physical Attacks.
8. Computer Break-Ins and Hacking.
Tools and Techniques.
Network Scanners.
Packet Sniffers.
Password Crackers.
Buffer Overows and Other Exploits.
Social Engineering.
Covering up Tracks.
Information Theft.
More than Trophies.
Tampering.
Domain Name Service Hacks.
Takedown.
Extent.
9. Masquerade.
Forged Documents and Messages.
Forgeries in Spam.
E-Mail Floods.
IP Spoofing.
Counterfeiting.
Trojan Horses.
Riding the Web.
E-Mail Relays.
Chipping.
Undercover Operations and Stings.
10. Cyberplagues.
Boot Viruses.
Macro Viruses.
Concealment Techniques.
Who Writes Viruses.
Prevalence.
Virus Hoaxes.
Worms.
III. DEFENSIVE INFORMATION WARFARE.
Cryptography.
Code Breaking.
Generation and Distribution of Keys.
Public-Key Distribution and Diffie-Hellman.
Public-Key Cryptography and RSA.
Key Storage and Recovery.
Applications of Encryption.
The Limits of Encryption.
Steganography.
Anonymity.
Sanitization.
Trash Disposal.
Shielding.
12. How to Tell a Fake.
Passwords and Other Secrets.
Integrity Checksums.
Digital Signatures.
Public-Key Management and Certificates.
Watermarks.
Call Back and Call Home.
Location-based Authentication.
Badges and Cards.
13. Monitors and Gatekeepers.
Access Control Monitors.
Limitations.
Filters.
Junk E-Mail Filters.
Web Filters.
Intrusion and Misuse Detection.
Automated Detection.
Computer Intrusion and Misuse Detection.
Analogy with the Human Immune System.
Detecting and Eradicating Viruses and Malicious Mobile Code.
14. In a Risky World.
Monitoring Security Publications.
Building It Secure.
The ITSEC and Common Criteria.
Evaluation.
Commercial Criteria.
ICSA Certification.
Accreditation.
The Capability Maturity Model.
Security Awareness and Training.
Avoiding Single Points of Failure.
Risk Management.
Insurance.
Benchmarking.
Due Care and Liability.
Incident Handling.
Containment and Recovery.
Improving Security.
Notification.
In-Kind Response.
Legal and Civil Remedies.
Economic and Military Response.
Emergency Preparedness.
Obstacles.
15. Defending the Nation.
Protecting Critical Infrastructures.
Presidential Decision Directive.
Encryption Policy.
Code Breaking.
International Policies.
U.S. Policy.
Legal Challenges.
Legislation.
Encryption Policy in Perspective.
Bibliography of Books.
Endnotes.
Index. 0201433036T04062001
商品描述(中文翻譯)
描述
本書提供了對資訊戰的全面且詳細的探討:電腦犯罪、網路犯罪和資訊恐怖主義。它描述了通過盜竊、欺騙或破壞對資訊系統的攻擊,並展示了為了擊敗這些威脅而採取的反制措施。書中聚焦於那些對國家、企業和個人造成基於資訊威脅的罪犯和資訊恐怖分子,Denning將網路犯罪置於更廣泛的背景中,將各種資訊犯罪及其反制措施整合進一個基於方法論的框架。
書中包括的主題有政府在執法調查及軍事和情報行動中使用資訊戰的情況;以及在言論自由和加密領域中出現的衝突。作者討論了進攻性資訊戰,包括資訊的獲取、對資訊的欺騙性利用和對資訊的拒絕訪問;同時也探討了防禦性資訊戰,特別是資訊安全的原則和實踐。本書的內容既廣泛又深入,通過真實世界的例子來說明網路空間的威脅。
目錄
I. 介紹
1. 海灣戰爭—資訊戰
海灣戰爭
資訊戰
從小雞到晶片
2. 資訊戰理論
資訊資源
資源的價值
參與者
進攻
防禦
雙重角色
進攻性資訊戰
進攻方的可用性增加
防守方的可用性減少
完整性減少
其他分類方案
防禦性資訊戰
防禦類型
資訊安全與資訊保證
CIA模型與授權
3. 遊樂場到戰場
玩耍
動機
文化
不僅僅是兒童遊戲
犯罪
知識產權犯罪
詐騙
電腦詐騙與濫用
打擊犯罪
個人權利
國家安全
外國情報
戰爭與軍事衝突
恐怖主義
網路戰爭
保護國家基礎設施
II. 進攻性資訊戰
4. 開放資源
開放源碼與競爭情報
隱私
通過開放資源窺探他人
網頁瀏覽
隱私法規
盜版
版權侵權
商標侵權
黑暗面
5. 心理戰與感知管理
謊言與扭曲
扭曲
偽造
騙局
社會工程
譴責
陰謀論
誹謗
騷擾
廣告
騙局
垃圾郵件戰爭
審查
美國的限制
6. 圍牆內部
叛徒與內奸
國家與軍事間諜活動
經濟間諜活動
企業間諜活動
隱私妥協
商業關係
訪問與請求
詐騙與挪用
虛假交易
數據篡改
內部破壞
實體攻擊
軟體攻擊
穿透周界
實體入侵與盜竊
搜查與扣押
垃圾箱潛水
炸彈
7. 捕捉信號
竊聽對話
行動電話攔截
傳呼機攔截
執法機構的竊聽
外國情報攔截
解碼訊息
流量分析
註冊與追蹤
位置追蹤
電信詐騙
藍盒子
PBX及相關詐騙
語音郵件詐騙
充值卡詐騙
克隆手機與行動電話詐騙
電腦網路監控
封包嗅探器
鍵盤監控
環境監控
攝影機與視頻
衛星與影像
Van Eck接收器
各種感測器
肩膀監視
隱私與問責
破壞
8. 電腦入侵與駭客
帳戶
獲取訪問
工具與技術
示範
網路掃描器
封包嗅探器
密碼破解器
緩衝區溢出與其他利用
社會工程
隱藏痕跡
資訊盜竊
收集戰利品
不僅僅是戰利品
篡改
網頁駭客
網域名稱服務駭客
拆除
遠端關閉
範圍
9. 偽裝
身份盜竊
偽造文件與訊息
電子郵件偽造
垃圾郵件中的偽造
電子郵件洪水
IP欺騙
假冒
特洛伊木馬
軟體特洛伊木馬
網路騎乘
電子郵件中繼
晶片
10. 網路瘟疫
病毒
程式病毒
開機病毒
巨集病毒
隱藏技術
誰在寫病毒
流行程度
病毒騙局
蠕蟲
III. 防禦性資訊戰
11. 秘密代碼與藏身之處
鎖與鑰匙
密碼學
數位密碼
破解代碼
鑰匙的生成與分發
公開金鑰分發與Diffie-Hellman
公開金鑰密碼學與RSA
鑰匙儲存與恢復
加密的應用
加密的限制
隱寫術
匿名性
清理
垃圾處理
屏蔽
12. 如何辨別假貨
生物識別
密碼與其他秘密
完整性檢查碼
數位簽名
公開金鑰管理與證書
水印
回撥與回家
基於位置的身份驗證
徽章與卡片
13. 監控者與守門人
存取控制
授權政策
存取控制監控
限制
過濾器
防火牆
垃圾郵件過濾器
網頁過濾器
入侵與濫用檢測
工作場所監控
自動檢測
電腦入侵與濫用檢測
與人體免疫系統的類比
檢測與消除病毒及惡意行動代碼
14. 在風險世界中
脆弱性監控
尋找電腦與網路安全缺陷
監控安全出版物
建立安全系統
橙皮書
ITSEC與通用標準
評估
商業標準
ICSA認證
認證
能力成熟度模型
安全意識與訓練
避免單點故障
備份
風險管理
風險評估與資產評價
保險
基準測試
謹慎與責任
事件處理
調查與評估
隔離與恢復
改進安全性
通知
實物回應
法律與民事救濟
經濟與軍事回應
緊急準備
障礙
15. 國家防衛
一般接受的系統安全原則
保護關鍵基礎設施
總統關於關鍵基礎設施保護的委員會
總統決策指令
書籍參考文獻
註釋
索引