Read Cybersecurity and Cyberwar Online

Authors: Peter W. Singer Allan Friedman,Allan Friedman

Cybersecurity and Cyberwar (56 page)

encryption,
105
,
108
–
109
,
245

Enthoven, Alain,
148

Estonia,
73
,
98
–
99
,
110
–
111
,
122
–
124
,
169
,
238

exfiltration,
58
–
59

F-35,
93

Facebook.
See
social media

Farwell, James,
189

Federal Bureau of Investigation (FBI),
89
,
96
–
97
,
103
,
109
,
112
,
169
–
170
,
207
,
217
,
225

Federal Risk and Authorization Management Program (FedRAMP),
198

Finnemore, Martha,
187

firewall,
62
.
See also
Great Firewall

Fisher, Neil,
185

Foreign Policy
magazine,
3
,
123
,
145

France,
107
,
182

Garcia, Greg,
94

Geer, Dan,
170

George, Richard “Dickie,”
235
–
236

Georgia (country),
111
–
112
,
125

GhostNet,
93

Global Positioning System (GPS),
36
,
129
–
130
,
132
,
254
,

Google,
26
,
49
,
56
–
57
,
80
,
102
,
158
,
199
,
218
,
233
,
249
,
252

grafting,
187
–
189

Grasso, Tom,
169

Great Firewall,
3
,
110

Green Revolution,
109

Guantánamo Bay,
96
–
97
,
195

hacker conventions,
236

hacktivism,
77
–
80
,
105

Hammersley, Ben,
15
,
242

Hao, Su,
139

hash,
46
,
133

Hathaway, Melissa,
179
,
208
,
230

Hayden, Michael,
4
,
192

Healey, Jason,
93
–
94
,
220

Hendler, James,
124

Henry, Shawn,
167

honeynet.
See
honeypot

honeypot,
212

Hughes, Rex,
185
–
186

HyperText Transfer Protocol (HTTP),
20
,
23

incentives

in cybersecurity recruiting,
238
–
239

in industry protection,
201
–
202
,
211
,
216
–
222
,
227
,
234
–
235
,
249

in interstate cyber relations
178
,
191
–
192
,
205
–
206

industrial control system (ICS),
115
,
200

information security

awareness of,
230

CIA triad of,
35

fostering of,
197
–
202

Information Sharing and Analysis Center (ISAC),
224

information sharing,
223
–
225
,
228

informatization,
142

insider threat,
38

Inspire
magazine,
105

insurance (cyber),
234

integrity attack,
70
–
71

Intellectual Property (IP),
50
,
70
,
88
,
94
–
95
,
139
,
146
,
186
,
189

International Telegraph Union (ITU),
181
–
184

Internet Corporation for Assigned Names and Numbers (ICANN),
22
,
29

Internet Engineering Task Force (IETF),
27
–
28

Internet freedom

and hacktivism,
80
,
83

definition of,
106
–
107

Internet governance,
26
–
30
,
107
–
108
,
180
–
185

Internet of Things,
253
–
254

Internet Protocol (IP) address.
See
Internet Protocol (IP)

Internet Protocol (IP),
18
,
21
–
24
,
28
–
29
,
33

Internet service provider (ISP),
24

Internet Society (ISOC),
28

intrusion detection systems,
62

Iran

as cyberattack target,
49
,
63
,
116
–
119
,
152

offensive cyber operations,
65
,
113
(
see also
Stuxnet)

Iraq,
52
–
53
,
102
,
132
,
150

Israel,
119
,
126
–
128
,
239

Japan,
164

Javaphile,
113

Jintao, Hu,
144

Johnson, Lyndon,
148

Joint Task Force—Computer Network Defense,
94

key (digital),
47
–
49
,
116

Krebs, Brian,
205
–
206
,
210
–
211

Langner, Ralph,
114
,
116
–
117
,
120
,
158
–
159
,
236
,

law of war,
118

Lewis, James,
89
,
94
,
126
,
188

Libicki, Martin,
104

Lin, Herbert,
148

Linden Dollar.
See
digital currency

logic bomb,
93
,
124

Lucas, George,
119

Lynn, William,
97
–
98
,
135
–
136

malware

characteristics of,
33
–
34
,
154
,
157
–
159
,
174
,
251

consequences of,
132
,
147
–
149

defending against,
60
–
62
,
205
–
206
,
212
,
224
–
225
(
see also
Conficker; DNS Changer Virus; Stuxnet)

examples of,
58
,
65
,
72
–
73
,
75
,
91
,
115
–
119

Mandiant,
76
,
226

Manning, Bradley,
38
,
52
–
53
,
55
,

Markov, Sergei,
110

McAfee,
60
,
91
,
157

McConnell, Mike,
99
,
151
,
196

McGeehan, Ryan,
216

metadata,
104
,
250

mobile device,
14
,
32
,
246
,
250
–
252

Moltke, Helmuth Graf,
212

money mules,
86
,
217

Moore, Tyler,
231

Morse code,
181

multifactor authentication,
244

Mulvenon, James,
139
,
161

mutually assured destruction (MAD),
145

Nacht, Michael,
157

Nasibett, John,
248

National Institute of Standards and Technology (NIST),
201
,
204
,
212

National Security Agency (NSA),
50
,
104
,
134
,
140
–
141
,
199
–
200
,
209

network-centric,
129

New York Times
,
76
,
95
,
128
,
141
,
213
,
226

North Atlantic Treaty Organization (NATO),
122
–
124

North Korea,
126
–
127
,
151
,
182
,
191
,

nuclear weapons,
7
,
71
,
99
,
137
–
138
,
144
–
147
,
160
–
162
,
190
,
247

Nye, Joseph,
3
,
152

Obama, Barrack,
2
–
3
,
202
,
204

Operation Orchard,
126
–
128

Operation Shady RAT,
58
,
91
–
93

packet,
17
–
18
,
23
–
24
,
166

Pac-Man,
46

Pakistan,
21
,
25
,
102

Palmer, Alan,
237

Panetta, Leon,
146

password,
32
,
40
,
60
,
65
,
103
,
241
–
244

patch,
62
–
63
,
72
,
139
,
218
,
245

patriotic hacking,
74
,
110
–
114
,
142
,
179
–
180
,
186

PayPal,
54
,
83
,
195
,
206
–
207

Pearl Harbor,
37
,
68
,
70
,
165
,

People's Liberation Army (PLA),
114
,
140
–
143

Petraeus, David,
33

phishing,
40
–
41
,
57
–
58
,
86
,
217
,
222
–
223

piracy

cyber,
83
,
139
,
179
–
180
,
189
,
194

maritime,
177
–
179

pornography,
20
,
40
,
105
,
109
,
206
–
207

Postel, Jon,
26
,
29

privacy,
33
–
35
,
74
,
106
,
108
–
110
,
175
,
199
,
208
,
218
,
228
,
234

protocol,
18
,
22
–
23
,
110
,
140
,
227

pwn,
41
,
58

Pyrrhic Victory,
156

Pyrrhus of Epirus.
See
Pyrrhic Victory

ransomware,
36
,
88
–
89
,

red line,
143
,
192

red-team,
127
,
141
,
172
,
211
,
213
,
215
,
238

RickRoll,
138

root access,
40

Rosenzweig, Paul,
227

Rothkopf, David,
121

Rumsfeld, Donald,
255
,

Russia

criminal networks,
32
,
89
,
151

offensive cyber operations,
73
,
98
,
110
–
112
,
122
–
125

U.S.–Russian relations,
72
,
186
,
191
–
192

Saffo, Paul,
20

Samuelson, Robert,
166

satellite,
102
,
148
,
151
,
161

Schneider, Jordan,
191

Schroeder, Christopher,
229

Scowcroft, Brent,
138

script kiddie,
78

Secure Internet Protocol Router Network (SIPRNet),
168

Securities and Exchange Commission (SEC),
229
–
230

September
11
,
35
,
37
,
50
,
68
,
97
–
98
,
101
,
122

Shanghai Group.
See
Unit 61398

Silk Road,
109

Snowden, Edward,
50
,
93
,
104
,
140
,
249

social engineering,
32
–
34
,
40
,
57
–
58
,
101
–
102
,
244

social media

Facebook,
15
–
16
,
40
,
58
,
68
,
82
,
89
,
170
,
211
,
215

Sina,
15

Tencent,
15

Twitter,
15
–
16
,
32
,
80
–
82
,
170
,
246
,
248

Weibo,
15

YouTube,
25
,
52
,
82
–
83
,
100

Other books

Little Sister Death by William Gay
The Comedians by Graham Greene
To Lose a Battle by Alistair Horne
If You Were Mine by Bella Andre
Place Called Estherville by Erskine Caldwell


readsbookonline.com Copyright 2016 - 2024