This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century.
• Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to cyber warfare that enables readers to better understanding of the impact of cyber warfare on modern conflicts
• Includes a detailed chronology that documents the evolution and use of cyber warfare over the past few decades
• Supplies further readings and a lengthy bibliography that offer a wealth of options to students conducting extensive research on the subject
Author(s): Paul J. Springer
Publisher: ABC-Clio
Year: 2017
Language: English
Commentary: TruePDF
Pages: 400
Tags: Cyber, Warfare
Cover......Page 1
Title......Page 4
Copyright......Page 5
Contents......Page 6
List of Entries......Page 8
Guide to Related Topics......Page 12
List of Documents......Page 16
Preface......Page 18
Introduction......Page 20
Advanced Persistent Threat (APT)......Page 22
Air Gapping......Page 24
Alexander, Keith B.......Page 25
Alperovitch, Dmitri......Page 26
Al Qaeda......Page 27
Anonymous......Page 28
Antivirus Software......Page 30
Apple Inc.......Page 32
Aramco Attack......Page 33
Arpanet......Page 34
Arquilla, John......Page 35
Assange, Julian......Page 36
Attribution......Page 37
Authentication......Page 39
Bitcoin......Page 41
Black Hat......Page 42
Botnet......Page 43
Brenner, Joel F.......Page 45
Bush, George W.......Page 46
Cebrowski, Arthur K.......Page 48
Central Intelligence Agency (CIA)......Page 49
Certificates......Page 51
Closed Network......Page 52
Cloud Computing......Page 53
Comprehensive National Cybersecurity Initiative (CNCI)......Page 54
Computer Emergency Response Team (CERT)......Page 56
Conficker Worm......Page 57
Cray, Seymour......Page 58
Cryptography......Page 59
Cyber Attack......Page 61
Cyber Crime......Page 65
Cyber Defence Management Authority (CDMA)......Page 67
Cyber Defense......Page 68
Cyber-Defense Exercise......Page 72
Cyber Deterrence......Page 74
Cyber-Equivalence Doctrine......Page 76
Cyber Escalation......Page 77
Cyber Espionage......Page 78
Cyber Ethics......Page 80
Cyber Sabotage......Page 82
Cyber Security......Page 83
Cyberspace Policy Review (2009)......Page 87
Cyber Terrorism......Page 88
Cyber War......Page 91
Cyber Warriors......Page 96
Cyber Weapon......Page 97
Dark Web......Page 100
Deep Web......Page 101
Defense Advanced Research Projects Agency (DARPA)......Page 102
Defense Information Systems Agency (DISA)......Page 104
Department of Defense (DOD)......Page 105
Department of Energy (DOE)......Page 108
Department of Homeland Security (DHS)......Page 109
Department of Justice (DOJ)......Page 111
Distributed Denial-of-Service (DDOS) Attack......Page 112
Domain Name System (DNS)......Page 114
E-Commerce......Page 116
Einstein (Cyber System)......Page 117
Electromagnetic Pulse (EMP)......Page 119
Encryption......Page 120
Escalation Dominance......Page 122
Estonian Cyber Attack (2007)......Page 123
Ethernet......Page 126
Evron, Gadi......Page 127
Federal Bureau of Investigation (FBI)......Page 128
Firewall......Page 130
Flame Worm......Page 131
Foreign Intelligence Surveillance Act (FISA)......Page 132
4chan......Page 133
Gates, Bill......Page 135
Gates, Robert M.......Page 136
Georbot......Page 137
Georgian Cyber Attack (2008)......Page 138
Ghostnet......Page 142
Google......Page 144
Hacker......Page 147
Hacktivist......Page 149
Hardware......Page 150
Hayden, Michael V.......Page 151
Honeypot......Page 152
Identity Theft......Page 154
Iloveyou Virus......Page 155
Information Warfare Weapons Treaty......Page 156
Informatization......Page 157
Infrastructure......Page 159
Intel Corporation......Page 161
Intellectual Property......Page 163
Internet......Page 164
Internet Corporation for Assigned Names and Numbers (ICANN)......Page 168
Internet Governance......Page 169
Internet Protocol (IP) Address......Page 171
Internet Relay Chat (IRC)......Page 172
Interpol......Page 173
Iran Cyber Capabilities......Page 175
Islamic State in Iraq and Syria (ISIS)......Page 177
Israel Cyber Capabilities......Page 178
JPMorgan Hack......Page 181
Just War......Page 182
Jwics Network......Page 183
Kaspersky, Yevgeniy “Eugene” Valentinovich......Page 185
Laws of Armed Conflict......Page 187
Live Free or Die Hard......Page 189
Logic Bomb......Page 190
Low Orbit Ion Cannon (lOIC)......Page 191
Lulzsec......Page 192
Malware......Page 194
Mandia, Kevin......Page 195
Manning, Bradley......Page 196
Matrix, The......Page 198
Microsoft Corporation......Page 199
Microsoft Windows......Page 202
Minimum Essential Emergency Communications Network (MEECN)......Page 204
Mitnick, Kevin......Page 205
Moonlight Maze......Page 206
Ms Blaster Worm......Page 208
Mydoom Virus......Page 209
National Cyber Security Strategy......Page 211
National Infrastructure Advisory Council (NIAC)......Page 213
National Infrastructure Protection Plan (NIPP)......Page 214
National Institute of Standards and Technology (NIST)......Page 215
National Security Agency (NSA)......Page 216
Nato Cooperative Cyber Defence Centre of Excellence (CCDCOE)......Page 220
Net-Centric Warfare (NCW)......Page 222
Net Neutrality......Page 223
Nimda Worm......Page 225
Niprnet......Page 226
North Atlantic Treaty Organization (NATO)......Page 227
North Korea Cyber Capabilities......Page 228
Obama, Barack......Page 231
Office of Personnel Management Data Breach......Page 232
Operation Ababil......Page 234
Operation Aurora......Page 235
Operation Babylon......Page 238
Operation Buckshot Yankee......Page 239
Operation Cartel......Page 240
Operation Cast Lead......Page 241
Operation Night Dragon......Page 242
Operation Orchard......Page 244
Operation Payback......Page 245
Operation Shady Rat......Page 247
Operation Titan Rain......Page 248
Patriotic Hacking......Page 251
People’s Liberation Army Unit 61398......Page 253
People’s Republic of China Cyber Capabilities......Page 255
Phishing......Page 259
Presidential Decision Directive 63 (1998)......Page 260
President’s Commission on Critical Infrastructure Protection (PCCIP)......Page 261
Prism Program......Page 263
Programmable Logic Controller (PLC)......Page 265
Putin, Vladimir......Page 266
Quadrennial Defense Review......Page 267
Rand Corporation......Page 269
Red Team......Page 270
Remote Administration Tool (RAT)......Page 271
Riga Summit......Page 272
Rogers, Michael S.......Page 273
Rumsfeld, Donald H.......Page 274
Russia Cyber Capabilities......Page 275
Rustock Botnet......Page 279
Second Army/Army Cyber Command......Page 281
Second Life......Page 282
Server......Page 283
Shamoon Virus......Page 284
Siprnet......Page 285
Snowden, Edward J.......Page 286
Social Engineering......Page 289
Solar Sunrise......Page 291
Solid-State Drive (SSD)......Page 293
Sony Hack......Page 294
Spear Phishing......Page 295
Spoofing......Page 296
Spyware......Page 297
SQL Injection......Page 298
SQL Slammer Worm......Page 299
Stuxnet......Page 300
Sun Microsystems......Page 303
Symantec Corporation......Page 305
Syrian Electronic Army (SEA)......Page 306
Tallinn Manual......Page 308
Target Corporation Hack......Page 309
Tenenbaum, Ehud “UDI”......Page 311
The Onion Router (TOR)......Page 312
Tier 1 Internet Service Provider......Page 313
TJX Corporation Hack......Page 314
Torrent......Page 315
Trojan Horse......Page 316
24th Air Force......Page 317
United States Cyber Capabilities......Page 319
Unrestricted Warfare......Page 323
USA Patriot Act......Page 324
U.S. Coast Guard Cyber Command (CGCYBER)......Page 325
U.S. Cyber Command (USCYBERCOM)......Page 326
U.S. Tenth Fleet......Page 331
Wargames......Page 332
Weapons of Mass Disruption......Page 333
Whitelist......Page 334
Wi-Fi......Page 335
Wikileaks......Page 336
Worm......Page 339
Zero-Day Vulnerability......Page 341
1. Remarks of President Barack Obama on Securing the Nation’s Cyber Infrastructure, Washington, D.C., May 29, 2009......Page 344
2. Excerpts of Secretary of State Hillary Clinton on Internet Freedom, Washington, D.C., January 21, 2010......Page 347
3. Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, NATO Cooperative Cyber Defence Centre of Excellence, 2010......Page 350
4. Excerpts of “International Strategy for Cyberspace,” May 2011......Page 352
5. Excerpts of Secretary of Defense Leon Panetta on Cyber Security, October 11, 2012......Page 358
6. Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: “Resilient Military Systems and the Advanced Cyber Threat,” January 2013......Page 362
7. Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013......Page 365
8. Excerpts from U.S. Department of Defense, The Department of Defense Cyber Strategy, April 2015......Page 368
Chronology......Page 372
Bibliography......Page 380
Contributors......Page 384
Index......Page 388