0
Your cart

Your cart is empty

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Buy Now

Computer Attack & Cyberterrorism (Paperback) Loot Price: R1,136
Discovery Miles 11 360
You Save: R548 (33%)
Computer Attack & Cyberterrorism (Paperback): Clay Wilson

Computer Attack & Cyberterrorism (Paperback)

Clay Wilson

 (sign in to rate)
List price R1,684 Loot Price R1,136 Discovery Miles 11 360 | Repayment Terms: R106 pm x 12* You Save R548 (33%)

Bookmark and Share

Expected to ship within 12 - 17 working days

Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a co-ordinated attack against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a co-ordinated cyberattack against the U.S. critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorists' goals. While there is no published evidence that terrorist organisations are currently planning a co-ordinated attack against computers, computer system vulnerabilities persist world-wide, and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called "bots", that direct large numbers of compromised computers to launch attacks through the Internet as swarms. The growing trend toward the use of more automated attack tools has also overwhelmed some of the current methodologies used for tracking Internet cyberattacks. This book provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The book also describes the possible effects of a co-ordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. Issues for Congress may include how could trends in cyberattacks be measured more effectively; what is appropriate guidance for DOD use of cyberweapons; should cybersecurity be combined with, or remain separate from, the physical security organization within DHS; how can commercial vendors be encouraged to improve the security of their products; and what are options to encourage U.S. citizens to follow better cybersecurity practices? Appendices to this book describe computer viruses, spyware, and "bot networks", and how malicious programs are used to enable cybercrime and cyberespionage. Also, similarities are drawn between planning tactics currently used by computer hackers and those used by terrorists groups for conventional attacks.

General

Imprint: nova science publishers
Country of origin: United States
Release date: 2009
Authors: Clay Wilson
Dimensions: 155 x 230 x 6mm (L x W x T)
Format: Paperback
Pages: 75
ISBN-13: 978-1-60692-337-5
Categories: Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
LSN: 1-60692-337-4
Barcode: 9781606923375

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Delusive Speech In The Sharing Economy…
Julie Reid Hardcover R4,283 R3,932 Discovery Miles 39 320
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R509 Discovery Miles 5 090
Masters of Deception: the Gang That…
Michele Slatalla Paperback R505 R468 Discovery Miles 4 680
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R594 R547 Discovery Miles 5 470
The Pentester BluePrint - Starting a…
PL Wylie Paperback R647 Discovery Miles 6 470
Malware Analysis Using Artificial…
Mark Stamp, Mamoun Alazab, … Hardcover R5,422 Discovery Miles 54 220
Hackers and Hacking - A Reference…
Thomas J. Holt, Bernadette H Schell Hardcover R2,095 Discovery Miles 20 950
Hacking
Walter Spivak Hardcover R985 Discovery Miles 9 850
Data Science in Cybersecurity and…
Leslie F Sikos, Kim-Kwang Raymond Choo Hardcover R5,366 Discovery Miles 53 660
Fakes, Scams & Forgeries - From Art to…
Brian Innes Hardcover R672 R601 Discovery Miles 6 010
Managerial Guide for Handling…
Lech J. Janczewski, Andrew Colarik Hardcover R2,512 Discovery Miles 25 120
Security, Privacy and User Interaction
Markus Jakobsson Hardcover R1,597 Discovery Miles 15 970

See more

Partners