Managerial Guide for Handling Cyber-Terrorism and Information Warfare

Managerial Guide for Handling Cyber-Terrorism and Information Warfare

by Janczewski, Andrew M. Colarik
     
 

ISBN-10: 1591405831

ISBN-13: 9781591405832

Pub. Date: 01/28/2005

Publisher: IGI Global

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information

…  See more details below

Overview

Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. Managerial Guide for Handling Cyber-Terrorism and Information Warfare defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

To listen to Dr. Andrew Colarik's appearance on Fox News concerning world terrorism, as well as the one hour discussion about this title on MyTechnologyLawyer.com.

Product Details

ISBN-13:
9781591405832
Publisher:
IGI Global
Publication date:
01/28/2005
Pages:
250
Product dimensions:
7.00(w) x 10.00(h) x 0.63(d)

Table of Contents

Part I: From Information Security to Cyberterrorism,
Chapter 1: Information and Computer Security,
Chapter 2: The Nature of Terrorism,
Chapter 3: Cyberterrorism,

Part 2: Attacks Against Information Technology,
Chapter 4: Physical Security,
Chapter 5: Denial of Service Threat,
Chapter 6: WEB Defacements and Semantic Attacks,
Chapter 7: DNS Attacks,
Chapter 8: Routing Vulnerabilities,
Chapter 9: Identity Stealing Attacks,

Part 3: Handling Information Security Issues,
Chapter 10: Identification, Authentication and Access Control,
Chapter 11: Personnel Security,
Chapter 12: Operations Management,
Chapter 13: Information Security Policy,
Chapter 14: Business Continuity Management

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >