Information Warfare

How to Survive Cyber Attacks

Michael Erbschloe

Publisher: Osborne, 2001, 313 pages

ISBN: 0-07-213260-4

Keywords: Information Security

Last modified: July 18, 2021, 10:18 a.m.

In today's electronic age, the threat of cyber attacks is great. For any organization with information-based assets, the deadliest weapons can come in the form of a keyboard , mouse, or personal computer. With hacking attacks and computer-based crimes increasing both in frequency and degree of seriousness, it's clear that information warfare is real and companies must protect themselves in order to survive. But how do you avoid getting caught in the crossfire of these attacks and how do you prepare when the electronic future is uncertain? The answers can be found inside Information Warfare, from recognized security expert and information technology consultant Michael Erbschloe.

This revealing book explores the impact of information warfare and the disruption and damage it can cause to governments, corporations, and commercial Web sites. It is possible for a small number of people to cause millions of dollars worth of economic destruction from a computer= Through the use of scenarios and profiles of the cyber-terrorist subculture, you'll learn practical defense strategies for protecting your company or eCommerce site from cyber attacks.

The book also examines the steps that governments around the world need to take in order to combat the advanced skill levels of some of the most dangerous cyber-criminals today. Whether you're responsible for making technology decisions that affect your company's future, or interested in computer security in general, you won't find a more accurate and up-to-date book covering the merging field of information warfare.

  1. Information Warfare: A New Framework for Analysis
    • Types of Information Warfare Strategies and Activities
    • The Probabilities of Various Information Warfare Strategies Being Implemented
    • The Anatomy of a National Information Warfare Defense Structure
    • Putting International Treaties into Perspective
    • The Military Side of Information Warfare
    • Civilian Law Enforcement and Information Warfare
    • The Impact of Information Warfare on Private Companies
    • Information Warfare Will Result in Civilian Casualties
    • Conclusions and an Agenda for Action
  2. Measuring the Economic Impact of Information Warfare
    • The Nature of the Economic Impact of Information Warfare Attacks
    • The Immediate Economic Impact of Information Warfare Attacks
    • The Short-Term Economic Impact of Information Warfare Attacks
    • The Long-Term Economic impact of Disruption
    • There Is No Day After in Cyberwar
    • Conclusions and an Agenda for Action
  3. The Electronic Doomsday Scenario: How Ten People Could Cause $1 Trillion in Economic Disruption
    • The PH2 Team
    • The Conception of PH2
    • Day 1: The Launch of PH2
    • Day 2: The Big Bug Bite
    • Day 3: Is It War Yet?
    • Day 4: A Russian Connection?
    • Day 5: Chaos Realized
    • Day 6: It Isn't Over Yet
    • Day 7: Attacks in Germany and Japan
    • Day 8: A German Bank Goes Down
    • Day 9: Wall Street Denial-of-Service Attack
    • Day 10: Middle East Conflict Brews, Wrong Number in Australia
    • Day 11: The Tiger Prowls
    • Day 12: Our Asian Daughters
    • Day 13: Tonya Strikes
    • Day 14: The Shambles of Electronic Commerce
    • Day 15: Busy Signal in London
    • Day 16: Target NASDAQ
    • Day 17: PH2 Realized
    • Day 18: Stock Brokerage Take-Down
    • Day 19: NASDAQ Foiled, Microsoft Hit
    • Day 20: Information Warfare, Guns, and Bombs
    • Day 21: Vulnerability and Exposure
    • Day 22: Santa Claus Hits
    • Day 23: Merry Christmas
    • The Aftermath of Information Warfare Attacks
  4. Preparing to Fight Against Major Threats
    • Assessing the Preparedness for Information Warfare in the United States
    • Assessing the Preparedness for Information Warfare of Other Governments
    • Assessing the Preparedness for Information Warfare of Terrorists and Criminals
    • Assessing the Preparedness for Information Warfare of Industry Groups
    • Traditional Diplomacy and Information Warfare
    • The Role of International Organizations
    • The Role of the Global Military Alliances
    • Martial Law and Cyberspace
    • The Super Cyber Protection Agency
    • Preparation from a Global Viewpoint
    • Conclusions and an Agenda for Action
  5. Information Warfare Strategies and Tactics from a Military Perspective
    • The Context of Military Tactics
    • Offensive and Defensive Ruinous Information Warfare Strategies and Tactics
    • Offensive and Responsive Containment Information Warfare Strategies and Tactics
    • Defensive Preventive Information Warfare Strategies and Tactics
    • Random and Sustained Terrorist Information Warfare Strategies and Tactics
    • Sustained and random Rogue Information Warfare Strategies and Tactics
    • Amateur Rogue Information Warfare Strategies and Tactics
    • Conclusions and an Agenda for Action
  6. Information Warfare Strategies and Tactics from a Corporate Perspective
    • Overview of Defensive Strategies for Private Companies
    • Participating in Defensive Preventive Information Warfare Planning
    • Surviving Offensive Ruinous and Containment Information Warfare  Attacks
    • Surviving Terrorist Information Warfare Attacks
    • Countering Rogue Information Warfare Attacks
    • Dealing with Amateur Rogue Information Warfare Attacks
    • Conclusions and an Agenda for Action
  7. Strategies and Tactics from a Terrorist and Criminal Perspective
    • Why Terrorists and Rogue Have an Advantage in Information Warfare
    • The Future Computer-Literate Terrorist and Criminal
    • Selecting Information Warfare Targets
    • Targets that Appeal to Both Terrorists and Rogue Criminals
    • Targets that Appeal to Terrorists, but Not Rogue Criminals
    • Targets that Appeal to Rogue Criminals, but Not Terrorists
    • Working from the Inside of Information Warfare Targets
    • Avoiding Pursuit and Capture
    • Funds Raising for Terrorists and Rogue Criminal Information Warriors
    • Conclusions and an Agenda for Action
  8. The Arms Dealers and Industrial Mobilization in Information Warfare
    • Mobilization Requirements for Technology Companies in Information Warfare
    • The Top Technology Companies that Can Provide Information Warfare Expertise
    • Aerospace and Defense Companies that Can Provide Information Warfare Expertise
    • Computer System Manufacturers that Can Provide Information Warfare Expertise
    • ZiLOGComputer Networking Product Companies that Can Provide Information Warfare Expertise
    • Telecommunications Systems Companies that Can Provide Information Warfare Expertise
    • Telecommunications Service Providers that Can Provide Information Warfare Support
    • Software Producers that Can Provide Information Warfare Expertise
    • Computer Services and Consulting Firms that Can Provide Information Warfare Expertise
    • Internet Service Providers that Can Provide Support to Information Warriors
    • Cooperation Between Governments and Technology Companies in Information Warfare
    • Conclusions and an Agenda for Action
  9. Civilian Casualties in Information Warfare
    • Why the Cyber Masses Are at Risk
    • Circumstances with the Highest Potential for Individual Citizens
    • Conclusions and an Agenda for Action
  10. The New Terrorist Profile: The Curious Nerd Is Moving to the Dark Side
    • The New Techno-Terrorists and Criminals
    • Computer Crimes and Terrorist Attacks
    • Where Information Warriors Will Come From
    • Understanding Why People Become Cyberwarriors
    • Motivation for Warriors in the New Frontier
    • The Alienation of Computer Geeks
    • Affinity Within the Pocket Protector Sect
    • Why Cybercrime and Terrorism Can Be Fun and Profitable
    • Will Americans Make Good Terrorists and Cyber Soldiers of Fortune?
    • Gender, Race, and Nationality in Information Warfare Careers
    • Conclusions and an Agenda for Action
  11. Law Enforcement: Being Behind the Technology Curve and How to Change That
    • The Good Guys: Poorly Paid and Under-Trained
    • Computers and Beyond: New Requirements for Cops and Special Agents
    • The Challenge of Developing Cyber Cops
    • Working for Big Brother: The New Information Highway Patrol
    • Terrorist and Criminal Profiling in Cyberspace
    • Conclusions and Agenda for Action
  12. Final Words for Policy Makers, Military Planners, and Corporate Executives
    • Cutting Through the Rhetoric
    • Funding National Defense
    • Risk Management in the Corporate Environment
    • Ecommerce and Information Warfare
    • Closing Comments

Reviews

Information Warfare

Reviewed by Roland Buresund

OK ***** (5 out of 10)

Last modified: May 21, 2007, 3:06 a.m.

This is more of an overview of the topic at hand, than a book on how to survive it. It is well worth reading, as he is a compelling author.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required