skip to main content
Skip header Section
Cybersecurity: High-impact Strategies - What You Need to Know Definitions, Adoptions, Impact, Benefits, Maturity, VendorsJune 2011
Publisher:
  • Tebbo
ISBN:978-1-74304-635-7
Published:17 June 2011
Pages:
770
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. This book is your ultimate resource for Cybersecurity. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Cybersecurity right away, covering: Cyber security standards, Hacker (term), 2007 cyberattacks on Estonia, 2010 cyberattacks on Myanmar, Camfecting, Chinese intelligence operations in the United States, Comprehensive National Cybersecurity Initiative, Computer insecurity, Cyber Operations, Cyber spying, Cyber-security regulation, Cyberattacks during the 2008 South Ossetia war, Cyberstrategy 3.0, Cyberterrorism, Cyberwarfare, Cyberwarfare in the United States, Denial-of-service attack, Echelon (signals intelligence), Electronic warfare, Endgame systems, Espionage, Firewall (computing), Fleet Electronic Warfare Center, GhostNet, Industrial espionage, Information warfare, Internet censorship in the People's Republic of China, Intervasion of the Uk, Iwar, July 2009 cyber attacks, Kberkaitseliit, List of cyber attack threat trends, Military-digital complex, National Cyber Security Division, National Cybersecurity Center, Political repression of cyber-dissidents, Proactive Cyber Defence, Signals intelligence, Stars virus, Stuxnet, Tcp reset attack, W3af, WarVox, Web brigades, Wireless signal jammer, Afssi-5020, Blacker, Bs 7799, Common Criteria, Ctcpec,

Contributors

Recommendations