000 07141nam a22006255i 4500
001 978-3-030-60618-3
003 DE-He213
005 20240423125351.0
007 cr nn 008mamaa
008 201203s2021 sz | s |||| 0|eng d
020 _a9783030606183
_9978-3-030-60618-3
024 7 _a10.1007/978-3-030-60618-3
_2doi
050 4 _aQA76.9.A25
050 4 _aJC596-596.2
072 7 _aURD
_2bicssc
072 7 _aCOM060040
_2bisacsh
072 7 _aURD
_2thema
082 0 4 _a005.8
_223
082 0 4 _a323.448
_223
100 1 _aDi Pietro, Roberto.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aNew Dimensions of Information Warfare
_h[electronic resource] /
_cby Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXV, 251 p. 30 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x2512-2193 ;
_v84
505 0 _aPreface -- Acknowledgements -- Foreword -- Organization -- Book structure -- 1. Information Disorder -- The new social ecosystem -- Threat: disinformation campaign -- Attacks -- Vaccine hesitancy -- Immigration -- Climate change -- Public naivety -- Alleged political scandals -- Countermeasures -- Low-quality information -- Fake-news detection and removal -- Credibility -- Spreading truth -- Datasets -- Malicious actors -- Social bots -- Fake profiles -- Astroturf -- Spammers -- Sock puppets -- Political memes -- New directions -- Part -- Economy -- State-sponsored Cryptocurrency -- Threat: Collapse of the cryptocurrencies -- Attacks and countermeasures -- Hash Functions -- Open Issues -- Scenario 2: Trust in the Computational Power -- Threat: New Technologies -- Scenario 3: Infrastructure -- Attacks and Countermeasures -- Open Issues -- Towards a State-Sponsored Cryptocurrency -- Bitcoin Limitations -- Develop a State-Sponsored Cryptocurrency -- Scenario 1: Stock market forecasts -- Threat: Information-based manipulation -- A large attack surface -- Attacks and countermeasures -- Open issues and future directions -- Threat: Trade-based manipulation -- Attacks -- Countermeasures -- Open issues and future directions -- Threat: Algorithm-based manipulation -- Algorithms taking over -- Loose cannons on the automation deck -- Attacks -- Countermeasures -- Open issues and future directions -- Other countermeasures -- Threat: Technological bias, divide, and monopoly -- Attacks and countermeasures -- Open issues and future directions -- Scenario 3: Remote stock market -- Threat: Attacks against availability -- Attacks and countermeasures -- Threat: Work-from-home perils -- Attacks -- Countermeasures -- Open issues and future directions -- Scenario 4: Complex financial networks -- Threat: Systemic risk and cascading failures -- Measures of systemic risk -- Economics and finance approaches -- Network approaches -- Countermeasures -- Open issues and future directions. Part -- Infrastructure -- Critical Infrastructure -- Scenario: Cyber Warfare targeting Critical Infrastructures -- Threat: Malware -- Attacks and Countermeasures -- Open Issues and Future Directions -- Scenario: A new Cyber-Physical threat from the sky -- Threat: Drones -- Attacks and Countermeasures -- Open Issues and Future Directions -- Attacks and countermeasures -- Open issues and future directions -- Threat: outsourcing of security -- Attacks and countermeasures -- Trust in the cloud -- Security perimeter -- Confidentiality -- Integrity -- Availability -- Open issues and future directions -- Technical side.
520 _aThis book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly,the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.
650 0 _aData protection
_xLaw and legislation.
650 0 _aData protection.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aCritical Thinking.
650 1 4 _aPrivacy.
650 2 4 _aData and Information Security.
650 2 4 _aMobile and Network Security.
650 2 4 _aCritical Thinking.
700 1 _aRaponi, Simone.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aCaprolu, Maurantonio.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aCresci, Stefano.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030606176
776 0 8 _iPrinted edition:
_z9783030606190
776 0 8 _iPrinted edition:
_z9783030606206
830 0 _aAdvances in Information Security,
_x2512-2193 ;
_v84
856 4 0 _uhttps://doi.org/10.1007/978-3-030-60618-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177167
_d177167