語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
New dimensions of information warfare
~
Di Pietro, Roberto.
FindBook
Google Book
Amazon
博客來
New dimensions of information warfare
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
New dimensions of information warfare/ by Roberto Di Pietro ... [et al.].
其他作者:
Di Pietro, Roberto.
出版者:
Cham :Springer International Publishing : : 2021.,
面頁冊數:
xv, 251 p. :ill., digital ;24 cm.
內容註:
Preface -- Acknowledgements -- Foreword -- Organization -- Book structure -- 1. Information Disorder -- The new social ecosystem -- Threat: disinformation campaign -- Attacks -- Vaccine hesitancy -- Immigration -- Climate change -- Public naivety -- Alleged political scandals -- Countermeasures -- Low-quality information -- Fake-news detection and removal -- Credibility -- Spreading truth -- Datasets -- Malicious actors -- Social bots -- Fake profiles -- Astroturf -- Spammers -- Sock puppets -- Political memes -- New directions -- Part -- Economy -- State-sponsored Cryptocurrency -- Threat: Collapse of the cryptocurrencies -- Attacks and countermeasures -- Hash Functions -- Open Issues -- Scenario 2: Trust in the Computational Power -- Threat: New Technologies -- Scenario 3: Infrastructure -- Attacks and Countermeasures -- Open Issues -- Towards a State-Sponsored Cryptocurrency -- Bitcoin Limitations -- Develop a State-Sponsored Cryptocurrency -- Scenario 1: Stock market forecasts -- Threat: Information-based manipulation -- A large attack surface -- Attacks and countermeasures -- Open issues and future directions -- Threat: Trade-based manipulation -- Attacks -- Countermeasures -- Open issues and future directions -- Threat: Algorithm-based manipulation -- Algorithms taking over -- Loose cannons on the automation deck -- Attacks -- Countermeasures -- Open issues and future directions -- Other countermeasures -- Threat: Technological bias, divide, and monopoly -- Attacks and countermeasures -- Open issues and future directions -- Scenario 3: Remote stock market -- Threat: Attacks against availability -- Attacks and countermeasures -- Threat: Work-from-home perils -- Attacks -- Countermeasures -- Open issues and future directions -- Scenario 4: Complex financial networks -- Threat: Systemic risk and cascading failures -- Measures of systemic risk -- Economics and finance approaches -- Network approaches -- Countermeasures -- Open issues and future directions. Part -- Infrastructure -- Critical Infrastructure -- Scenario: Cyber Warfare targeting Critical Infrastructures -- Threat: Malware -- Attacks and Countermeasures -- Open Issues and Future Directions -- Scenario: A new Cyber-Physical threat from the sky -- Threat: Drones -- Attacks and Countermeasures -- Open Issues and Future Directions -- Attacks and countermeasures -- Open issues and future directions -- Threat: outsourcing of security -- Attacks and countermeasures -- Trust in the cloud -- Security perimeter -- Confidentiality -- Integrity -- Availability -- Open issues and future directions -- Technical side.
Contained By:
Springer Nature eBook
標題:
Information warfare. -
電子資源:
https://doi.org/10.1007/978-3-030-60618-3
ISBN:
9783030606183
New dimensions of information warfare
New dimensions of information warfare
[electronic resource] /by Roberto Di Pietro ... [et al.]. - Cham :Springer International Publishing :2021. - xv, 251 p. :ill., digital ;24 cm. - Advances in information security,v.841568-2633 ;. - Advances in information security ;v.84..
Preface -- Acknowledgements -- Foreword -- Organization -- Book structure -- 1. Information Disorder -- The new social ecosystem -- Threat: disinformation campaign -- Attacks -- Vaccine hesitancy -- Immigration -- Climate change -- Public naivety -- Alleged political scandals -- Countermeasures -- Low-quality information -- Fake-news detection and removal -- Credibility -- Spreading truth -- Datasets -- Malicious actors -- Social bots -- Fake profiles -- Astroturf -- Spammers -- Sock puppets -- Political memes -- New directions -- Part -- Economy -- State-sponsored Cryptocurrency -- Threat: Collapse of the cryptocurrencies -- Attacks and countermeasures -- Hash Functions -- Open Issues -- Scenario 2: Trust in the Computational Power -- Threat: New Technologies -- Scenario 3: Infrastructure -- Attacks and Countermeasures -- Open Issues -- Towards a State-Sponsored Cryptocurrency -- Bitcoin Limitations -- Develop a State-Sponsored Cryptocurrency -- Scenario 1: Stock market forecasts -- Threat: Information-based manipulation -- A large attack surface -- Attacks and countermeasures -- Open issues and future directions -- Threat: Trade-based manipulation -- Attacks -- Countermeasures -- Open issues and future directions -- Threat: Algorithm-based manipulation -- Algorithms taking over -- Loose cannons on the automation deck -- Attacks -- Countermeasures -- Open issues and future directions -- Other countermeasures -- Threat: Technological bias, divide, and monopoly -- Attacks and countermeasures -- Open issues and future directions -- Scenario 3: Remote stock market -- Threat: Attacks against availability -- Attacks and countermeasures -- Threat: Work-from-home perils -- Attacks -- Countermeasures -- Open issues and future directions -- Scenario 4: Complex financial networks -- Threat: Systemic risk and cascading failures -- Measures of systemic risk -- Economics and finance approaches -- Network approaches -- Countermeasures -- Open issues and future directions. Part -- Infrastructure -- Critical Infrastructure -- Scenario: Cyber Warfare targeting Critical Infrastructures -- Threat: Malware -- Attacks and Countermeasures -- Open Issues and Future Directions -- Scenario: A new Cyber-Physical threat from the sky -- Threat: Drones -- Attacks and Countermeasures -- Open Issues and Future Directions -- Attacks and countermeasures -- Open issues and future directions -- Threat: outsourcing of security -- Attacks and countermeasures -- Trust in the cloud -- Security perimeter -- Confidentiality -- Integrity -- Availability -- Open issues and future directions -- Technical side.
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.
ISBN: 9783030606183
Standard No.: 10.1007/978-3-030-60618-3doiSubjects--Topical Terms:
606619
Information warfare.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
New dimensions of information warfare
LDR
:05823nmm a2200337 a 4500
001
2236752
003
DE-He213
005
20201203203626.0
006
m d
007
cr nn 008maaau
008
211111s2021 sz s 0 eng d
020
$a
9783030606183
$q
(electronic bk.)
020
$a
9783030606176
$q
(paper)
024
7
$a
10.1007/978-3-030-60618-3
$2
doi
035
$a
978-3-030-60618-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
N532 2021
245
0 0
$a
New dimensions of information warfare
$h
[electronic resource] /
$c
by Roberto Di Pietro ... [et al.].
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xv, 251 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
1568-2633 ;
$v
v.84
505
0
$a
Preface -- Acknowledgements -- Foreword -- Organization -- Book structure -- 1. Information Disorder -- The new social ecosystem -- Threat: disinformation campaign -- Attacks -- Vaccine hesitancy -- Immigration -- Climate change -- Public naivety -- Alleged political scandals -- Countermeasures -- Low-quality information -- Fake-news detection and removal -- Credibility -- Spreading truth -- Datasets -- Malicious actors -- Social bots -- Fake profiles -- Astroturf -- Spammers -- Sock puppets -- Political memes -- New directions -- Part -- Economy -- State-sponsored Cryptocurrency -- Threat: Collapse of the cryptocurrencies -- Attacks and countermeasures -- Hash Functions -- Open Issues -- Scenario 2: Trust in the Computational Power -- Threat: New Technologies -- Scenario 3: Infrastructure -- Attacks and Countermeasures -- Open Issues -- Towards a State-Sponsored Cryptocurrency -- Bitcoin Limitations -- Develop a State-Sponsored Cryptocurrency -- Scenario 1: Stock market forecasts -- Threat: Information-based manipulation -- A large attack surface -- Attacks and countermeasures -- Open issues and future directions -- Threat: Trade-based manipulation -- Attacks -- Countermeasures -- Open issues and future directions -- Threat: Algorithm-based manipulation -- Algorithms taking over -- Loose cannons on the automation deck -- Attacks -- Countermeasures -- Open issues and future directions -- Other countermeasures -- Threat: Technological bias, divide, and monopoly -- Attacks and countermeasures -- Open issues and future directions -- Scenario 3: Remote stock market -- Threat: Attacks against availability -- Attacks and countermeasures -- Threat: Work-from-home perils -- Attacks -- Countermeasures -- Open issues and future directions -- Scenario 4: Complex financial networks -- Threat: Systemic risk and cascading failures -- Measures of systemic risk -- Economics and finance approaches -- Network approaches -- Countermeasures -- Open issues and future directions. Part -- Infrastructure -- Critical Infrastructure -- Scenario: Cyber Warfare targeting Critical Infrastructures -- Threat: Malware -- Attacks and Countermeasures -- Open Issues and Future Directions -- Scenario: A new Cyber-Physical threat from the sky -- Threat: Drones -- Attacks and Countermeasures -- Open Issues and Future Directions -- Attacks and countermeasures -- Open issues and future directions -- Threat: outsourcing of security -- Attacks and countermeasures -- Trust in the cloud -- Security perimeter -- Confidentiality -- Integrity -- Availability -- Open issues and future directions -- Technical side.
520
$a
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.
650
0
$a
Information warfare.
$3
606619
650
0
$a
Cyberterrorism
$x
Prevention.
$3
819287
650
0
$a
Information technology
$x
Security measures.
$3
590547
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Social media
$x
Security measures.
$3
2046164
650
0
$a
Electronic commerce
$x
Security measures.
$3
590545
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Privacy.
$3
528582
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Critical Thinking.
$3
3275118
700
1
$a
Di Pietro, Roberto.
$3
907233
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advances in information security ;
$v
v.84.
$3
3488422
856
4 0
$u
https://doi.org/10.1007/978-3-030-60618-3
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9398637
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入