Chapter 17

Cyber Warfare and Terrorism

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • Defend against computer-based espionage.

  • Employ defenses against computer-based terrorism.

  • Choose appropriate defense strategies for your network.

  • Employ defenses against information warfare.

Introduction

To this point, we have covered a wide variety of threats to computer networks, but these threats have primarily been carried out by lone perpetrators, including virus infections that spread randomly via e-mail and the Internet. Because computer systems and networks are such an integral part of all types of organizations, it is only natural that they have become a primary target for espionage ...

Get Network Defense and Countermeasures: Principles and Practices, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.