ebook img

Encyclopedia of Cyber Warfare PDF

400 Pages·2017·23.251 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Encyclopedia of Cyber Warfare

Encyclopedia of Cyber Warfare Encyclopedia of Cyber Warfare PAUL J. SPRINGER, EDITOR Copyright © 2017 by ABC-CLIO, LLC All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except for the inclusion of brief quotations in a review, without prior permission in writing from the publisher. Library of Congress Cataloging-in-Publication Data Names: Springer, Paul J., editor. Title: Encyclopedia of cyber warfare / Paul J. Springer, editor. Description: ABC-CLIO, LLC : Santa Barbara, CA, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016058373 (print) | LCCN 2017002115 (ebook) | ISBN 9781440844249 (hardcopy : alk. paper) | ISBN 9781440844256 (eBook) Subjects: LCSH: Cyberspace operations (Military science)—United States— Encyclopedias. | Cyberterrorism—Encyclopedias. Classification: LCC U163 .E45 2017 (print) | LCC U163 (ebook) | DDC 355.4/1—dc23 LC record available at https://lccn.loc.gov/2016058373 ISBN: 978-1-4408-4424-9 EISBN: 978-1-4408-4425-6 21 20 19 18 17 1 2 3 4 5 This book is also available as an eBook. ABC-CLIO An Imprint of ABC-CLIO, LLC ABC-CLIO, LLC 130 Cremona Drive, P.O. Box 1911 Santa Barbara, California 93116-1911 www.abc-clio.com This book is printed on acid-free paper Manufactured in the United States of America Contents List of Entries vii Guide to Related Topics xi List of Documents xv Preface xvii Introduction xix A–Z Entries 1 Primary Documents 323 Chronology 351 Bibliography 359 Contributors 363 Index 367 List of Entries Advanced Persistent Threat (APT) Cyber Defence Management Authority Air Gapping (CDMA) Alexander, Keith B. Cyber Defense Alperovitch, Dmitri Cyber-Defense Exercise Al Qaeda Cyber Deterrence Anonymous Cyber-Equivalence Doctrine Antivirus Software Cyber Escalation Apple Inc. Cyber Espionage Aramco Attack Cyber Ethics ARPANET Cyber Sabotage Arquilla, John Cyber Security Assange, Julian Cyberspace Policy Review (2009) Attribution Cyber Terrorism Authentication Cyber War Cyber Warriors Baidu Cyber Weapon Bitcoin Black Hat Dark Web Blacklist Deep Web Botnet Defense Advanced Research Projects Brenner, Joel F. Agency (DARPA) Bush, George W. Defense Information Systems Agency (DISA) Carpenter, Shawn Department of Defense (DoD) Cebrowski, Arthur K. Department of Energy (DOE) Central Intelligence Agency (CIA) Department of Homeland Security Certificates (DHS) Clarke, Richard A. Department of Justice (DOJ) Closed Network Distributed Denial-of-Service (DDoS) Cloud Computing Attack Code Red Worm Domain Name System (DNS) Comprehensive National Cybersecurity Initiative (CNCI) E-commerce Computer Emergency Response Team EINSTEIN (Cyber System) (CERT) Electromagnetic Pulse (EMP) Conficker Worm Encryption Cray, Seymour Escalation Dominance Cryptography Estonian Cyber Attack (2007) Cyber Attack Ethernet Cyber Crime Evron, Gadi viii List of EntriEs Federal Bureau of Investigation (FBI) Live Free or Die Hard FireEye Logic Bomb Firewall Low Orbit Ion Cannon (LOIC) Flame Worm LulzSec Foreign Intelligence Surveillance Act (FISA) 4chan Malware Mandia, Kevin Gates, Bill Mandiant Corporation Gates, Robert M. Manning, Bradley Gauss Worm Matrix, The Georbot McAfee Georgian Cyber Attack (2008) Microsoft Corporation GhostNet Microsoft Windows Google Minimum Essential Emergency Communications Network (MEECN) Hacker Mitnick, Kevin Hacktivist Moonlight Maze Hardware Moore’s Law Hayden, Michael V. MS Blaster Worm Honeypot MyDoom Virus Identity Theft National Cyber Security Strategy ILOVEYOU Virus National Infrastructure Advisory Council Information Warfare Weapons Treaty (NIAC) Informatization National Infrastructure Protection Plan Infrastructure (NIPP) Intel Corporation National Institute of Standards and Intellectual Property Technology (NIST) Internet National Security Agency (NSA) Internet Corporation for Assigned Names NATO Cooperative Cyber Defence Centre and Numbers (ICANN) of Excellence (CCDCOE) Internet Governance Net-centric Warfare (NCW) Internet Protocol (IP) Address Net Neutrality Internet Relay Chat (IRC) Neuromancer Internet Service Provider (ISP) Nimda Worm Interpol NIPRNet Iran Cyber Capabilities North Atlantic Treaty Organization Islamic State in Iraq and Syria (ISIS) (NATO) Israel Cyber Capabilities North Korea Cyber Capabilities JPMorgan Hack Obama, Barack Just War Office of Personnel Management Data JWICS Network Breach Operation Ababil Kaspersky Lab Operation Aurora Kaspersky, Yevgeniy “Eugene” Valentinovich Operation Babylon Operation Buckshot Yankee Laws of Armed Conflict Operation Cartel Libicki, Martin C. Operation Cast Lead List of EntriEs ix Operation Night Dragon Sony Hack Operation Orchard Spear Phishing Operation Payback Spoofing Operation Shady RAT Spyware Operation Titan Rain SQL Injection SQL Slammer Worm Panetta, Leon E. Stuxnet Patriotic Hacking Sun Microsystems People’s Liberation Army Unit 61398 Supervisory Control and Data Acquisition People’s Republic of China Cyber (SCADA) Capabilities Symantec Corporation Phishing Syrian Electronic Army (SEA) Presidential Decision Directive 63 (1998) President’s Commission on Critical Tallinn Manual Infrastructure Protection (PCCIP) Target Corporation Hack Prey Tenenbaum, Ehud “Udi” PRISM Program Terminator, The Programmable Logic Controller (PLC) The Onion Router (TOR) Putin, Vladimir Tier 1 Internet Service Provider TJX Corporation Hack Quadrennial Defense Review Torrent Transmission Control Protocol/Internet RAND Corporation Protocol (TCP/IP) Red Team Trojan Horse Remote Administration Tool (RAT) 24th Air Force Riga Summit Rogers, Michael S. United States Cyber Capabilities Rumsfeld, Donald H. Unrestricted Warfare Russia Cyber Capabilities USA PATRIOT Act Russian Business Network (RBN) U.S. Coast Guard Cyber Command Rustock Botnet (CGCYBER) U.S. Cyber Command (USCYBERCOM) Second Army/Army Cyber Command U.S. Tenth Fleet Second Life Server WarGames Shamoon Virus Weapons of Mass Disruption Silk Road White Hat SIPRNet Whitelist Snowden, Edward J. Wi-Fi Social Engineering WikiLeaks Software Worm Solar Sunrise Solid-State Drive (SSD) Zero-Day Vulnerability

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.