- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the…mehr
Andere Kunden interessierten sich auch für
- Roberto Di PietroNew Dimensions of Information Warfare117,99 €
- Information Technology for Peace and Security44,99 €
- Blockchains222,99 €
- Blockchain for Cybersecurity in Cyber-Physical Systems117,99 €
- Industrial Control Systems Security and Resiliency110,99 €
- Blockchain for Cybersecurity in Cyber-Physical Systems117,99 €
- Luigi MartinoCybersecurity in Italy33,99 €
-
-
-
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain.
This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains.
The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book.
This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.
This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains.
The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book.
This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.
Produktdetails
- Produktdetails
- Advances in Information Security 84
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-60620-6
- 1st ed. 2021
- Seitenzahl: 268
- Erscheinungstermin: 5. Dezember 2021
- Englisch
- Abmessung: 235mm x 155mm x 15mm
- Gewicht: 411g
- ISBN-13: 9783030606206
- ISBN-10: 3030606201
- Artikelnr.: 62895530
- Advances in Information Security 84
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-60620-6
- 1st ed. 2021
- Seitenzahl: 268
- Erscheinungstermin: 5. Dezember 2021
- Englisch
- Abmessung: 235mm x 155mm x 15mm
- Gewicht: 411g
- ISBN-13: 9783030606206
- ISBN-10: 3030606201
- Artikelnr.: 62895530
Dr. Roberto Di Pietro, ACM Distinguished Scientist, is Full Professor in Cybersecurity at HBKU-CSE. Previously, he was in the capacity of Global Head Security Research at Nokia Bell Labs, Associate Professor (with tenure) of Computer Science at University of Padova, and Assistant Professor (with tenure) at University of Roma Tre. He began his career serving for 10+ years in the military---8 years as état-major senior military officer within the Italian Carabinieri Army. Overall, he has been working in the information security field for 25+ years, leading both technology-oriented and research-focused teams in the private sector, government, academia, and international organizations (United Nations HQ, EUROJUST, IAEA, WIPO). His main research interests include security and privacy for distributed systems (e.g. Blockchain technology, Cloud, IoT, online social networks), virtualization security, applied cryptography, intrusion detection, computer forensics, and data science. Other than being involved in M&A of start-up---and having founded one (exited)---, and leading as PI a few high impact international research projects, he has also matured an extensive strategic consultant experience on cybersecurity topics. He has been producing 240+ scientific papers and patents over the cited topics, has co-authored two books, edited one, and contributed to a few others. In 2011-2012 he was awarded a Chair of Excellence from University Carlos III, Madrid. In 2020 he received the Jean-Claude Laprie award for having significantly influenced the theory and practice of Dependable Computing. Simone Raponi is currently a 3rd year Ph.D. Student in Computer Science and Engineering at Hamad Bin Khalifa University in Doha, Qatar. He is a teaching assistant of Cyber Security and an active member of the HBKU Cyber-Security Research Innovation Lab, headed by Prof. Roberto Di Pietro. He received both his Bachelor and his Master's Degree with honor inComputer Science at Sapienza, University of Rome, Italy, on topics strictly related to applied Security and Privacy. In 2018 he joined Iberdrola Qatar and Telefonica Research Barcelona for 2 months as machine learning scientist intern. His major research interests include Cybersecurity, Artificial Intelligence, and Privacy. Maurantonio Caprolu is currently a Ph.D. student in Computer Science and Engineering at Hamad Bin Khalifa University. He is a teaching assistant of Cyber Security and an active member of the HBKU Cyber-Security Research Innovation Lab, headed by Prof. Roberto Di Pietro. He received his master's degree with honors in Computer Science at Sapienza, University of Rome, Italy, on topics strictly related to applied Security and Privacy. He worked several years as an IT consultant for Telecom Italia, Rome. In 2016, he joined as a senior programmer the European Antitrust Forensic IT Tools Project, headed by the University of Roma Tre and theItalian competition authority (AGCM). He participated at the NATO Locked Shields 2017, the world's largest and most advanced international technical live-fire cyber defense exercise, as a member of the Italian Blue Team coordinated by the Italian Minister of Defense. In 2019 he joined Iberdrola as a research assistant for a 3-month internship that aimed at integrating blockchain-based solutions in the context of smart grids. His research interests span several areas of cybersecurity, which include blockchain technologies, software-defined networking, cryptocurrencies, edge/fog architecture, and computer forensic. Stefano received his PhD in Information Engineering from the University of Pisa in 2018. He received his Bachelor's and Master's degrees in Computer Engineering respectively in 2007 and 2013 and a post-graduate Master's degree in Big Data Analytics & Social Mining in 2016, from the University of Pisa. Currently, he is a Researcher at the Institute of Informatics and Telematics of the National Research Council (IIT-CNR) in Pisa, Italy. His professional experiences encompass both national and international collaborations with renowned institutions such as the Hamad Bin Khalifa University (Doha, Qatar), Nokia Bell Labs (Paris, France), ISTI-CNR (Pisa, Italy), and the LARTTE Laboratory of the Scuola Normale Superiore (Pisa, Italy). His interests broadly fall at the intersection of Web Science and Data Science, and include the following topics: social media analysis and mining; online social networks security; information disorder; artificial intelligence, machine learning, data science; crisis informatics. Stefano published more than 50 peer-reviewed papers on these topics on top conferences and journals in these fields. In 2018, he was selected among the winners of a SAGE Ocean Concept Grant. In 2019, he won the IEEE Computer Society Italy Section Chapter 2018 PhD Thesis Award and the IEEE Next-Generation Data Scientist Award. He was selected and invited to participate to the 8th Heidelberg Laureate Forum. He is member of the IEEE and of the ACM.
Preface.- Acknowledgements.- Foreword.- Organization.- Book structure.- 1. Information Disorder.- The new social ecosystem.- Threat: disinformation campaign.- Attacks.- Vaccine hesitancy.- Immigration.- Climate change.- Public naivety.- Alleged political scandals.- Countermeasures.- Low-quality information.- Fake-news detection and removal.- Credibility.- Spreading truth.- Datasets.- Malicious actors.- Social bots.- Fake profiles.- Astroturf.- Spammers.- Sock puppets.- Political memes.- New directions.- Part.- Economy.- State-sponsored Cryptocurrency.- Threat: Collapse of the cryptocurrencies.- Attacks and countermeasures.- Hash Functions.- Open Issues.- Scenario 2: Trust in the Computational Power.- Threat: New Technologies.- Scenario 3: Infrastructure.- Attacks and Countermeasures.- Open Issues.- Towards a State-Sponsored Cryptocurrency.- Bitcoin Limitations.- Develop a State-Sponsored Cryptocurrency.- Scenario 1: Stock market forecasts.- Threat: Information-based manipulation.- A large attack surface.- Attacks and countermeasures.- Open issues and future directions.- Threat: Trade-based manipulation.- Attacks.- Countermeasures.- Open issues and future directions.- Threat: Algorithm-based manipulation.- Algorithms taking over.- Loose cannons on the automation deck.- Attacks.- Countermeasures.- Open issues and future directions.- Other countermeasures.- Threat: Technological bias, divide, and monopoly.- Attacks and countermeasures.- Open issues and future directions.- Scenario 3: Remote stock market.- Threat: Attacks against availability.- Attacks and countermeasures.- Threat: Work-from-home perils.- Attacks.- Countermeasures.- Open issues and future directions.- Scenario 4: Complex financial networks.- Threat: Systemic risk and cascading failures.- Measures of systemic risk.- Economics and finance approaches.- Network approaches.- Countermeasures.- Open issues and future directions. Part.- Infrastructure.- Critical Infrastructure.- Scenario: Cyber Warfare targeting Critical Infrastructures.- Threat: Malware.- Attacks and Countermeasures.- Open Issues and Future Directions.- Scenario: A new Cyber-Physical threat from the sky.- Threat: Drones.- Attacks and Countermeasures.- Open Issues and Future Directions.- Attacks and countermeasures.- Open issues and future directions.- Threat: outsourcing of security.- Attacks and countermeasures.- Trust in the cloud.- Security perimeter.- Confidentiality.- Integrity.- Availability.- Open issues and future directions.- Technical side
Preface.- Acknowledgements.- Foreword.- Organization.- Book structure.- 1. Information Disorder.- The new social ecosystem.- Threat: disinformation campaign.- Attacks.- Vaccine hesitancy.- Immigration.- Climate change.- Public naivety.- Alleged political scandals.- Countermeasures.- Low-quality information.- Fake-news detection and removal.- Credibility.- Spreading truth.- Datasets.- Malicious actors.- Social bots.- Fake profiles.- Astroturf.- Spammers.- Sock puppets.- Political memes.- New directions.- Part.- Economy.- State-sponsored Cryptocurrency.- Threat: Collapse of the cryptocurrencies.- Attacks and countermeasures.- Hash Functions.- Open Issues.- Scenario 2: Trust in the Computational Power.- Threat: New Technologies.- Scenario 3: Infrastructure.- Attacks and Countermeasures.- Open Issues.- Towards a State-Sponsored Cryptocurrency.- Bitcoin Limitations.- Develop a State-Sponsored Cryptocurrency.- Scenario 1: Stock market forecasts.- Threat: Information-based manipulation.- A large attack surface.- Attacks and countermeasures.- Open issues and future directions.- Threat: Trade-based manipulation.- Attacks.- Countermeasures.- Open issues and future directions.- Threat: Algorithm-based manipulation.- Algorithms taking over.- Loose cannons on the automation deck.- Attacks.- Countermeasures.- Open issues and future directions.- Other countermeasures.- Threat: Technological bias, divide, and monopoly.- Attacks and countermeasures.- Open issues and future directions.- Scenario 3: Remote stock market.- Threat: Attacks against availability.- Attacks and countermeasures.- Threat: Work-from-home perils.- Attacks.- Countermeasures.- Open issues and future directions.- Scenario 4: Complex financial networks.- Threat: Systemic risk and cascading failures.- Measures of systemic risk.- Economics and finance approaches.- Network approaches.- Countermeasures.- Open issues and future directions. Part.- Infrastructure.- Critical Infrastructure.- Scenario: Cyber Warfare targeting Critical Infrastructures.- Threat: Malware.- Attacks and Countermeasures.- Open Issues and Future Directions.- Scenario: A new Cyber-Physical threat from the sky.- Threat: Drones.- Attacks and Countermeasures.- Open Issues and Future Directions.- Attacks and countermeasures.- Open issues and future directions.- Threat: outsourcing of security.- Attacks and countermeasures.- Trust in the cloud.- Security perimeter.- Confidentiality.- Integrity.- Availability.- Open issues and future directions.- Technical side
Preface.- Acknowledgements.- Foreword.- Organization.- Book structure.- 1. Information Disorder.- The new social ecosystem.- Threat: disinformation campaign.- Attacks.- Vaccine hesitancy.- Immigration.- Climate change.- Public naivety.- Alleged political scandals.- Countermeasures.- Low-quality information.- Fake-news detection and removal.- Credibility.- Spreading truth.- Datasets.- Malicious actors.- Social bots.- Fake profiles.- Astroturf.- Spammers.- Sock puppets.- Political memes.- New directions.- Part.- Economy.- State-sponsored Cryptocurrency.- Threat: Collapse of the cryptocurrencies.- Attacks and countermeasures.- Hash Functions.- Open Issues.- Scenario 2: Trust in the Computational Power.- Threat: New Technologies.- Scenario 3: Infrastructure.- Attacks and Countermeasures.- Open Issues.- Towards a State-Sponsored Cryptocurrency.- Bitcoin Limitations.- Develop a State-Sponsored Cryptocurrency.- Scenario 1: Stock market forecasts.- Threat: Information-based manipulation.- A large attack surface.- Attacks and countermeasures.- Open issues and future directions.- Threat: Trade-based manipulation.- Attacks.- Countermeasures.- Open issues and future directions.- Threat: Algorithm-based manipulation.- Algorithms taking over.- Loose cannons on the automation deck.- Attacks.- Countermeasures.- Open issues and future directions.- Other countermeasures.- Threat: Technological bias, divide, and monopoly.- Attacks and countermeasures.- Open issues and future directions.- Scenario 3: Remote stock market.- Threat: Attacks against availability.- Attacks and countermeasures.- Threat: Work-from-home perils.- Attacks.- Countermeasures.- Open issues and future directions.- Scenario 4: Complex financial networks.- Threat: Systemic risk and cascading failures.- Measures of systemic risk.- Economics and finance approaches.- Network approaches.- Countermeasures.- Open issues and future directions. Part.- Infrastructure.- Critical Infrastructure.- Scenario: Cyber Warfare targeting Critical Infrastructures.- Threat: Malware.- Attacks and Countermeasures.- Open Issues and Future Directions.- Scenario: A new Cyber-Physical threat from the sky.- Threat: Drones.- Attacks and Countermeasures.- Open Issues and Future Directions.- Attacks and countermeasures.- Open issues and future directions.- Threat: outsourcing of security.- Attacks and countermeasures.- Trust in the cloud.- Security perimeter.- Confidentiality.- Integrity.- Availability.- Open issues and future directions.- Technical side
Preface.- Acknowledgements.- Foreword.- Organization.- Book structure.- 1. Information Disorder.- The new social ecosystem.- Threat: disinformation campaign.- Attacks.- Vaccine hesitancy.- Immigration.- Climate change.- Public naivety.- Alleged political scandals.- Countermeasures.- Low-quality information.- Fake-news detection and removal.- Credibility.- Spreading truth.- Datasets.- Malicious actors.- Social bots.- Fake profiles.- Astroturf.- Spammers.- Sock puppets.- Political memes.- New directions.- Part.- Economy.- State-sponsored Cryptocurrency.- Threat: Collapse of the cryptocurrencies.- Attacks and countermeasures.- Hash Functions.- Open Issues.- Scenario 2: Trust in the Computational Power.- Threat: New Technologies.- Scenario 3: Infrastructure.- Attacks and Countermeasures.- Open Issues.- Towards a State-Sponsored Cryptocurrency.- Bitcoin Limitations.- Develop a State-Sponsored Cryptocurrency.- Scenario 1: Stock market forecasts.- Threat: Information-based manipulation.- A large attack surface.- Attacks and countermeasures.- Open issues and future directions.- Threat: Trade-based manipulation.- Attacks.- Countermeasures.- Open issues and future directions.- Threat: Algorithm-based manipulation.- Algorithms taking over.- Loose cannons on the automation deck.- Attacks.- Countermeasures.- Open issues and future directions.- Other countermeasures.- Threat: Technological bias, divide, and monopoly.- Attacks and countermeasures.- Open issues and future directions.- Scenario 3: Remote stock market.- Threat: Attacks against availability.- Attacks and countermeasures.- Threat: Work-from-home perils.- Attacks.- Countermeasures.- Open issues and future directions.- Scenario 4: Complex financial networks.- Threat: Systemic risk and cascading failures.- Measures of systemic risk.- Economics and finance approaches.- Network approaches.- Countermeasures.- Open issues and future directions. Part.- Infrastructure.- Critical Infrastructure.- Scenario: Cyber Warfare targeting Critical Infrastructures.- Threat: Malware.- Attacks and Countermeasures.- Open Issues and Future Directions.- Scenario: A new Cyber-Physical threat from the sky.- Threat: Drones.- Attacks and Countermeasures.- Open Issues and Future Directions.- Attacks and countermeasures.- Open issues and future directions.- Threat: outsourcing of security.- Attacks and countermeasures.- Trust in the cloud.- Security perimeter.- Confidentiality.- Integrity.- Availability.- Open issues and future directions.- Technical side