computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 7
Chapter 7 –  Information Warfare
     Seymour Bosworth

Chapter Contents:

   7.1    Introduction
   7.2    Vulnerabilities
   7.2.1    Critical Infrastructure
   7.2.2    Off-the-Shelf Software
   7.2.3    Dissenting Views
   7.2.4    Rebuttal
   7.3    Goals and Objectives
   7.3.1    Infrastructure
   7.3.2    Military
   7.3.3    Government
   7.3.4    Transportation
   7.3.4.1    Aviation
   7.3.4.2    Railroads
   7.3.4.3    Trucking
   7.3.4.4    Shipping
   7.3.4.5    Other Transportation Vulnerabilities
   7.3.5    Commerce
   7.3.6    Financial Disruptions
   7.3.6.1    Payment Systems
   7.3.6.2    Investment Mechanisms
   7.3.6.3    Banking
   7.3.7    Medical Security
   7.3.8    Law Enforcement
   7.3.9    International and Corporate Espionage
   7.3.10    Communications
   7.3.11    Destabilization of Economic Infrastructure
   7.4    Sources of Threats and Attacks
   7.4.1    Nation-States
   7.4.1.1    China and Information Warfare
   7.4.1.2    Strategies
   7.4.1.3    Training
   7.4.2    Cyberterrorists
   7.4.3    Corporations
   7.4.4    Activists
   7.4.5    Criminals
   7.4.6    Hobbyists
   7.5    Weapons of Cyberwar
   7.5.1    Denial of Service and Distributed Denial of Service
   7.5.2    Malicious Code
   7.5.3    Cryptography
   7.5.4    Psychological Operations
   7.5.5    Physical Attacks
   7.5.6    Biological and Chemical Weapons and Weapons of Mass Destruction
   7.5.7    Weapons Inadvertently Provided
   7.6    Defenses
   7.6.1    Legal Defenses
   7.6.2    Forceful Defenses
   7.6.3    Technical Defenses
   7.6.4    In-Kind Counterattacks
   7.6.5    Cooperative Efforts
   7.7    Summary
   7.8    Further Reading
   7.9    Notes

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved