E-Book, Englisch, Band 84, 251 Seiten, eBook
Di Pietro / Raponi / Caprolu New Dimensions of Information Warfare
1. Auflage 2020
ISBN: 978-3-030-60618-3
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, Band 84, 251 Seiten, eBook
Reihe: Advances in Information Security
ISBN: 978-3-030-60618-3
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Preface.- Acknowledgements.- Foreword.- Organization.- Book structure.- 1. Information Disorder.- The new social ecosystem.- Threat: disinformation campaign.- Attacks.- Vaccine hesitancy.- Immigration.- Climate change.- Public naivety.- Alleged political scandals.- Countermeasures.- Low-quality information.- Fake-news detection and removal.- Credibility.- Spreading truth.- Datasets.- Malicious actors.- Social bots.- Fake profiles.- Astroturf.- Spammers.- Sock puppets.- Political memes.- New directions.- Part.- Economy.- State-sponsored Cryptocurrency.- Threat: Collapse of the cryptocurrencies.- Attacks and countermeasures.- Hash Functions.- Open Issues.- Scenario 2: Trust in the Computational Power.- Threat: New Technologies.- Scenario 3: Infrastructure.- Attacks and Countermeasures.- Open Issues.- Towards a State-Sponsored Cryptocurrency.- Bitcoin Limitations.- Develop a State-Sponsored Cryptocurrency.- Scenario 1: Stock market forecasts.- Threat: Information-based manipulation.- A large attack surface.- Attacks and countermeasures.- Open issues and future directions.- Threat: Trade-based manipulation.- Attacks.- Countermeasures.- Open issues and future directions.- Threat: Algorithm-based manipulation.- Algorithms taking over.- Loose cannons on the automation deck.- Attacks.- Countermeasures.- Open issues and future directions.- Other countermeasures.- Threat: Technological bias, divide, and monopoly.- Attacks and countermeasures.- Open issues and future directions.- Scenario 3: Remote stock market.- Threat: Attacks against availability.- Attacks and countermeasures.- Threat: Work-from-home perils.- Attacks.- Countermeasures.- Open issues and future directions.- Scenario 4: Complex financial networks.- Threat: Systemic risk and cascading failures.- Measures of systemic risk.- Economics and finance approaches.- Network approaches.- Countermeasures.- Open issues and future directions. Part.- Infrastructure.- Critical Infrastructure.- Scenario: Cyber Warfare targeting Critical Infrastructures.- Threat: Malware.- Attacks and Countermeasures.- Open Issues and Future Directions.- Scenario: A new Cyber-Physical threat from the sky.- Threat: Drones.- Attacks and Countermeasures.- Open Issues and Future Directions.- Attacks and countermeasures.- Open issues and future directions.- Threat: outsourcing of security.- Attacks and countermeasures.- Trust in the cloud.- Security perimeter.- Confidentiality.- Integrity.- Availability.- Open issues and future directions.- Technical side