Adobe PDF (27.82 MB)
Table of Contents - Adobe PDF (860.92 kB)
Brochure
Download
User comments
Similar Books
Title Details:
Fundamentals of Cyberwar and Cybersecurity
Authors: Doukas, Nikolaos
Subject: MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > FOUNDATIONAL CONCEPTS IN SECURITY
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > THREATS AND ATTACKS
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > NETWORK SECURITY
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > CRYPTOGRAPHY
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > WEB SECURITY
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > SECURITY POLICY AND GOVERNANCE
MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > HUMAN-COMPUTER INTERACTION > HUMAN FACTORS AND SECURITY
Keywords:
Cyberwar
Cyber-defense
Cyberattack
Information warfare
Error correction
User authentication
Network-centric warfare
Information system security requirements
Simulation
C4ISR Systems
Information superiority
Cyberspace
Network security
Penetration testing
Denial of service attacks
Vulnerabilities
Malware
Cyber kill chain
Anomaly detection
Description:
Abstract:
This book presents fundamental principles of information processing in the context of operations, as well as new scenarios that have been developed and are known as cyberwar. The first chapter covers fundamental principles of information theory. Error detection and correction schemes and cryptographic techniques for remote user authentication are outlined. The second chapter presents security requirements, threats, and vulnerabilities in information systems. In the third chapter, sensor technologies are presented for information acquisition. Visualization and information technologies are overviewed. The concept of simulation is analyzed, along with its applications. The C4ISR systems are introduced together with the digital battlefield. The fourth chapter presents cyberwar, the information field, and its relation to sovereignty. Additionally, network-centric, information, electronic and hybrid warfare are introduced. Cybercrime, cyberespionage, and defenses against cyberattacks are analyzed. The fifth chapter presents information system network technologies that will be used for the practical exercises given later. In the sixth chapter, these technologies are used to describe various kinds of cyberattacks, the methodology of cyber-intruders via the Cyber Kill Chain as well as network cryptography. The seventh chapter covers ethical and legal issues related to defending cyberspace. In the eighth chapter, a series of simple cybersecurity exercises is presented that include the creation of a simple virtual lab. In the ninth chapter, more complicated attacks are presented, such as the man-in-the-middle, WEP-Crack, mobile phone espionage and Denial of Service. The last chapter of the book analyzes the effects of cyberattacks in the physical world are explored and passive protection measures are analyzed. Dynamic detection techniques using anomalies are analyzed. Finally, the field of cyber forensics is introduced for the study of the effects of cybercrimes. A practical exercise on this domain is also presented that uses currently available software tools.
Linguistic Editors: Kalliaras, Dimitris
Graphic Editors: Galati, Katerina
Type: Postgraduate textbook
Creation Date: 07-05-2025
Item Details:
ISBN 978-618-228-288-5
License: Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0)
DOI http://dx.doi.org/10.57713/kallipos-1043
Handle http://hdl.handle.net/11419/14034
Bibliographic Reference: Doukas, N. (2025). Fundamentals of Cyberwar and Cybersecurity [Postgraduate textbook]. Kallipos, Open Academic Editions. https://dx.doi.org/10.57713/kallipos-1043
Language: Greek
Consists of:
1. Information Theory Principles and Security
2. Fundamentals of Information System Security
3. Digital Battlefield – C4ISR Systems
4. Cyberwar
5. Cybersecurity
6. Cyber Defense and Attack Tools
7. Ethical and Legal Issues
8. Practical Exercises and Examples
9. Applied Attacks to Networks
10. Cyber Defense and the Physical World
Number of pages 452
Publication Origin: Kallipos, Open Academic Editions
You can also view
User comments
There are no published comments available!