Show Less

The Dark Sides of the Internet

On Cyber Threats and Information Warfare

Roland Heickerö

The rapid development in information technology during the last few decades has not only given us greater opportunities to freely search for information and contacts. The growth of the Internet has also created new opportunities for criminal organisations, political activists and terrorists to threaten individuals, companies and countries. Individuals and organisations are also increasingly the targets of attacks and espionage via the web. There are various kinds of illegitimate and criminal activities. Every modern state thus has to create strategies and courses of action in order to protect information, networks and computers that are vital to society from malicious cyber activities. Creating secure systems and minimising risks of information being leaked or tampered with should be a prioritised task. It is also important to understand what threats arise from the information technological revolution. The purpose of this book is to give a broad background to the development of the dark side of the internet and its consequences. It is not about scaremongering, but about creating understanding and knowledge and thus preparedness in order to handle detrimental activities. It describes the changes in progress and what they may mean to society, companies and individuals as well as to the military and police.

Prices

Show Summary Details
Restricted access

References

Extract

Printed sources Ackerman, R. (2009) “Threats Imperil the Entire U.S. Infrastructure. From the military to the economy, the country is open to vast damage”. SIG- NAL, AFCEA, International Journal, July 2009. Alberts, D.S, Hayes, R.E. (2003) “Power to the Edge. Command, Control in the Information Age”. DoD Command and Control Research Pro- gram, CCRP Publication Series. Alberts, D., Gartska, J., Stein, F. (1999) “Network Centric Warfare: Devel- oping and leveraging information superiority”. CCRP Publication Se- ries. (2:nd edition). “Antennen gedreht”. Wirtschaftwoche no 46, 9 November 2000. Published in the European Parliament Report 2001. “Annerkennungen zur sicherheitslage der Deutschen Wirtschaft”. ASW; Bonn, April 2001, published in the European Parliament Report 2001. Atwan, A.B. (2006) “The secret History of al Qaeda”. University of Cali- fornia Press, Berkley, USA Augustsson, T. (2010) ”Litet hopp stoppa nätvirus”. Svenska Dagbladet, 16 June 2010. Barret, B.M. (2008) “Information Warfare: China’s response to U.S. tech- nological Advantages”. International Journal of Intelligence, vol. 18, no 4. Bishop, M. (2003) “Computer Security Art and Science”. Pearson Educa- tion Inc., New Jersey, 2003. Bogdanov, S.A. (2004) “Warfare of the Future”. Military Thought, vol. 13, no 1. Bowcott, Owen. (2009) “Abdul Qadeer Khan. Pakistani nuclear scientist accused of industrial espionage”. The Guardian, 6 February 2009. Brenner, B. (2007) “Black Hat 2007: Estonian attacks were a cyberriot, not warfare”. Information Security Magazine, 3 August 2007. Carr, J (2010) “Inside Cyber Warfare. Mapping the Cyber Underworld”. O’Reilly Media Inc., Sebastopol CA, USA. 158 Carman, D. (2002) “Translation and Analysis of the...

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.