Read Cybersecurity and Cyberwar Online
Authors: Peter W. Singer Allan Friedman,Allan Friedman
Social Security number,
31
,
34
,
81
,
228
socialing.
See
social engineering
Sommer, Peter,
163
Spafford, Eugene,
90
spear phishing.
See
phishing
SQL injection. See Structured Query Language (SQL)
Stop Huntingdon Animal Cruelty (SHAC),
79
â
80
Stop Online Piracy Act (SOPA),
107
Structured Query Language (SQL),
42
Stuxnet
creation and effects of,
35
,
38
,
98
,
114
â
118
,
213
lessons of,
118
â
120
,
132
,
152
,
156
â
158
supervisory control and data acquisition (SCADA),
15
,
115
,
130
,
159
Syria
as cyberattack target,
55
,
126
â
128
offensive cyber operations,
45
,
112
(
see also
Operation Orchard)
test beds,
212
The Cabal,
196
The Jetsons
, 2
Transport Control Protocol (TCP),
18
Twitter.
See
social media
typosquatting,
86
Ukraine,
73
United Nations (UN),
30
,
53
,
123
â
124
,
160
,
186
,
252
Universal Serial Bus (USB),
53
,
64
unmanned systems,
130
,
150
â
151
virus.
See
malware
WANK,
77
watering hole,
144
Weizhan, Chen,
143
West, Darrell,
204
whitelisting,
241
WikiLeaks,
50
â
55
,
79
,
81
,
83
â
84
,
194
â
195
Wilkinson, Winston,
231
World War II,
69
â
70
,
112
,
122
,
128
,
132
,
172
World Wide Web War I,
78
worm.
See
malware
Yoran, Amit,
216
YouTube.
See
social media
Zero-day,
115
zombie,
44
.
See also
bot net