New Dimensions of Information Warfare New Dimensions of Information Warfare
Advances in Information Security

New Dimensions of Information Warfare

Roberto Di Pietro and Others
    • $139.99
    • $139.99

Publisher Description

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain.
This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology.  Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains.
The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions.  Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones.  A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book.
This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

GENRE
Computers & Internet
RELEASED
2020
December 3
LANGUAGE
EN
English
LENGTH
266
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
10.5
MB

More Books Like This

Next-Generation Enterprise Security and Governance Next-Generation Enterprise Security and Governance
2022
Cyber Security Practitioner's Guide Cyber Security Practitioner's Guide
2020
Socio-Technical Aspects in Security Socio-Technical Aspects in Security
2022
Social Media Analytics, Strategies and Governance Social Media Analytics, Strategies and Governance
2022
Strategy, Leadership, and AI in the Cyber Ecosystem Strategy, Leadership, and AI in the Cyber Ecosystem
2020
Human Aspects of Information Security, Privacy and Trust Human Aspects of Information Security, Privacy and Trust
2017

More Books by Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu & Stefano Cresci

Computer Security – ESORICS 2022 Computer Security – ESORICS 2022
2022
Computer Security – ESORICS 2022 Computer Security – ESORICS 2022
2022
Computer Security – ESORICS 2022 Computer Security – ESORICS 2022
2022
Security, Privacy, and Anonymity in Computation, Communication, and Storage Security, Privacy, and Anonymity in Computation, Communication, and Storage
2021
Security, Privacy, and Anonymity in Computation, Communication, and Storage Security, Privacy, and Anonymity in Computation, Communication, and Storage
2021
Intrusion Detection Systems Intrusion Detection Systems
2008

Other Books in This Series

Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007