000 | 03794nam a22005175i 4500 | ||
---|---|---|---|
001 | 978-3-031-35287-4 | ||
003 | DE-He213 | ||
005 | 20240423125526.0 | ||
007 | cr nn 008mamaa | ||
008 | 230626s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031352874 _9978-3-031-35287-4 |
||
024 | 7 |
_a10.1007/978-3-031-35287-4 _2doi |
|
050 | 4 | _aTK5105.59 | |
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM043050 _2bisacsh |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aWatters, Paul A. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aCounterintelligence in a Cyber World _h[electronic resource] / _cby Paul A. Watters. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXIX, 145 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aChapter. 1. Counterintelligence Theory -- Chapter. 2. The Cyber Operational Environment -- Chapter. 3. Cyber Threats (and Opportunities) -- Chapter. 4. Psychology and Criminal Profiling -- Chapter. 5. Counterespionage -- Chapter. 6. Technical Surveillance -- Chapter. 7. Physical Surveillance -- Chapter. 8. Data Analysis -- Chapter. 9. Attack Attribution -- Chapter. 10. Practical Deception -- Chapter. 11. Legal Issues in Cyber Counterintelligence -- Chapter. 12. Ethical Issues in Cyber Counterintelligence. | |
520 | _aThis book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed. A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence. This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading. | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer crimes. | |
650 | 0 | _aSecurity, International. | |
650 | 1 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aCybercrime. |
650 | 2 | 4 | _aInternational Security Studies. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031352867 |
776 | 0 | 8 |
_iPrinted edition: _z9783031352881 |
776 | 0 | 8 |
_iPrinted edition: _z9783031352898 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-35287-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c178895 _d178895 |