Title Details: | |
Fundamentals of Cyberwar and Cybersecurity |
|
Authors: |
Doukas, Nikolaos |
Subject: | MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > FOUNDATIONAL CONCEPTS IN SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > THREATS AND ATTACKS MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > NETWORK SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > CRYPTOGRAPHY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > WEB SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > SECURITY POLICY AND GOVERNANCE MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > HUMAN-COMPUTER INTERACTION > HUMAN FACTORS AND SECURITY |
Keywords: |
Cyberwar
Cyber-defense Cyberattack Information warfare Error correction User authentication Network-centric warfare Information system security requirements Simulation C4ISR Systems Information superiority Cyberspace Network security Penetration testing Denial of service attacks Vulnerabilities Malware Cyber kill chain Anomaly detection |
Description: | |
Abstract: |
This book presents fundamental principles of information processing in the context of operations, as well as new scenarios that have been developed and are known as cyberwar.
The first chapter covers fundamental principles of information theory. Error detection and correction schemes and cryptographic techniques for remote user authentication are outlined. The second chapter presents security requirements, threats, and vulnerabilities in information systems. In the third chapter, sensor technologies are presented for information acquisition. Visualization and information technologies are overviewed. The concept of simulation is analyzed, along with its applications. The C4ISR systems are introduced together with the digital battlefield. The fourth chapter presents cyberwar, the information field, and its relation to sovereignty. Additionally, network-centric, information, electronic and hybrid warfare are introduced. Cybercrime, cyberespionage, and defenses against cyberattacks are analyzed. The fifth chapter presents information system network technologies that will be used for the practical exercises given later. In the sixth chapter, these technologies are used to describe various kinds of cyberattacks, the methodology of cyber-intruders via the Cyber Kill Chain as well as network cryptography. The seventh chapter covers ethical and legal issues related to defending cyberspace. In the eighth chapter, a series of simple cybersecurity exercises is presented that include the creation of a simple virtual lab. In the ninth chapter, more complicated attacks are presented, such as the man-in-the-middle, WEP-Crack, mobile phone espionage and Denial of Service. The last chapter of the book analyzes the effects of cyberattacks in the physical world are explored and passive protection measures are analyzed. Dynamic detection techniques using anomalies are analyzed. Finally, the field of cyber forensics is introduced for the study of the effects of cybercrimes. A practical exercise on this domain is also presented that uses currently available software tools.
|
Linguistic Editors: |
Kalliaras, Dimitris |
Graphic Editors: |
Galati, Katerina |
Type: |
Postgraduate textbook |
Creation Date: | 07-05-2025 |
Item Details: | |
ISBN |
978-618-228-288-5 |
License: |
Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
DOI | http://dx.doi.org/10.57713/kallipos-1043 |
Handle | http://hdl.handle.net/11419/14034 |
Bibliographic Reference: | Doukas, N. (2025). Fundamentals of Cyberwar and Cybersecurity [Postgraduate textbook]. Kallipos, Open Academic Editions. https://dx.doi.org/10.57713/kallipos-1043 |
Language: |
Greek |
Consists of: |
1. Information Theory Principles and Security 2. Fundamentals of Information System Security 3. Digital Battlefield – C4ISR Systems 4. Cyberwar 5. Cybersecurity 6. Cyber Defense and Attack Tools 7. Ethical and Legal Issues 8. Practical Exercises and Examples 9. Applied Attacks to Networks 10. Cyber Defense and the Physical World |
Number of pages |
452 |
Publication Origin: |
Kallipos, Open Academic Editions |
You can also view | |
User comments | |
There are no published comments available! | |