Read Cybersecurity and Cyberwar Online
Authors: Peter W. Singer Allan Friedman,Allan Friedman
Enthoven, Alain,
148
Estonia,
73
,
98
â
99
,
110
â
111
,
122
â
124
,
169
,
238
F-35,
93
Facebook.
See
social media
Farwell, James,
189
Federal Bureau of Investigation (FBI),
89
,
96
â
97
,
103
,
109
,
112
,
169
â
170
,
207
,
217
,
225
Federal Risk and Authorization Management Program (FedRAMP),
198
Finnemore, Martha,
187
firewall,
62
.
See also
Great Firewall
Fisher, Neil,
185
Foreign Policy
magazine,
3
,
123
,
145
Garcia, Greg,
94
Geer, Dan,
170
George, Richard “Dickie,”
235
â
236
Georgia (country),
111
â
112
,
125
GhostNet,
93
Global Positioning System (GPS),
36
,
129
â
130
,
132
,
254
,
Google,
26
,
49
,
56
â
57
,
80
,
102
,
158
,
199
,
218
,
233
,
249
,
252
Grasso, Tom,
169
Green Revolution,
109
hacker conventions,
236
Hao, Su,
139
Hendler, James,
124
Henry, Shawn,
167
honeynet.
See
honeypot
honeypot,
212
HyperText Transfer Protocol (HTTP),
20
,
23
incentives
in cybersecurity recruiting,
238
â
239
in industry protection,
201
â
202
,
211
,
216
â
222
,
227
,
234
â
235
,
249
in interstate cyber relations
178
,
191
â
192
,
205
â
206
industrial control system (ICS),
115
,
200
information security
awareness of,
230
CIA triad of,
35
Information Sharing and Analysis Center (ISAC),
224
information sharing,
223
â
225
,
228
informatization,
142
insider threat,
38
Inspire
magazine,
105
insurance (cyber),
234
Intellectual Property (IP),
50
,
70
,
88
,
94
â
95
,
139
,
146
,
186
,
189
International Telegraph Union (ITU),
181
â
184
Internet Corporation for Assigned Names and Numbers (ICANN),
22
,
29
Internet Engineering Task Force (IETF),
27
â
28
Internet freedom
Internet governance,
26
â
30
,
107
â
108
,
180
â
185
Internet Protocol (IP) address.
See
Internet Protocol (IP)
Internet Protocol (IP),
18
,
21
â
24
,
28
â
29
,
33
Internet service provider (ISP),
24
Internet Society (ISOC),
28
intrusion detection systems,
62
Iran
as cyberattack target,
49
,
63
,
116
â
119
,
152
offensive cyber operations,
65
,
113
(
see also
Stuxnet)
Japan,
164
Javaphile,
113
Jintao, Hu,
144
Johnson, Lyndon,
148
Joint Task ForceâComputer Network Defense,
94
Krebs, Brian,
205
â
206
,
210
â
211
Langner, Ralph,
114
,
116
â
117
,
120
,
158
â
159
,
236
,
law of war,
118
Libicki, Martin,
104
Lin, Herbert,
148
Linden Dollar.
See
digital currency
Lucas, George,
119
Lynn, William,
97
â
98
,
135
â
136
malware
characteristics of,
33
â
34
,
154
,
157
â
159
,
174
,
251
defending against,
60
â
62
,
205
â
206
,
212
,
224
â
225
(
see also
Conficker; DNS Changer Virus; Stuxnet)
examples of,
58
,
65
,
72
â
73
,
75
,
91
,
115
â
119
Manning, Bradley,
38
,
52
â
53
,
55
,
Markov, Sergei,
110
McGeehan, Ryan,
216
mobile device,
14
,
32
,
246
,
250
â
252
Moltke, Helmuth Graf,
212
Moore, Tyler,
231
Morse code,
181
multifactor authentication,
244
mutually assured destruction (MAD),
145
Nacht, Michael,
157
Nasibett, John,
248
National Institute of Standards and Technology (NIST),
201
,
204
,
212
National Security Agency (NSA),
50
,
104
,
134
,
140
â
141
,
199
â
200
,
209
network-centric,
129
New York Times
,
76
,
95
,
128
,
141
,
213
,
226
North Atlantic Treaty Organization (NATO),
122
â
124
North Korea,
126
â
127
,
151
,
182
,
191
,
nuclear weapons,
7
,
71
,
99
,
137
â
138
,
144
â
147
,
160
â
162
,
190
,
247
Operation Shady RAT,
58
,
91
â
93
Pac-Man,
46
Palmer, Alan,
237
Panetta, Leon,
146
password,
32
,
40
,
60
,
65
,
103
,
241
â
244
patriotic hacking,
74
,
110
â
114
,
142
,
179
â
180
,
186
People's Liberation Army (PLA),
114
,
140
â
143
Petraeus, David,
33
phishing,
40
â
41
,
57
â
58
,
86
,
217
,
222
â
223
piracy
cyber,
83
,
139
,
179
â
180
,
189
,
194
pornography,
20
,
40
,
105
,
109
,
206
â
207
privacy,
33
â
35
,
74
,
106
,
108
â
110
,
175
,
199
,
208
,
218
,
228
,
234
protocol,
18
,
22
â
23
,
110
,
140
,
227
Pyrrhic Victory,
156
Pyrrhus of Epirus.
See
Pyrrhic Victory
red-team,
127
,
141
,
172
,
211
,
213
,
215
,
238
RickRoll,
138
root access,
40
Rosenzweig, Paul,
227
Rothkopf, David,
121
Rumsfeld, Donald,
255
,
Russia
offensive cyber operations,
73
,
98
,
110
â
112
,
122
â
125
U.S.âRussian relations,
72
,
186
,
191
â
192
Saffo, Paul,
20
Samuelson, Robert,
166
Schneider, Jordan,
191
Schroeder, Christopher,
229
Scowcroft, Brent,
138
script kiddie,
78
Secure Internet Protocol Router Network (SIPRNet),
168
Securities and Exchange Commission (SEC),
229
â
230
September
11
,
35
,
37
,
50
,
68
,
97
â
98
,
101
,
122
Shanghai Group.
See
Unit 61398
Silk Road,
109
Snowden, Edward,
50
,
93
,
104
,
140
,
249
social engineering,
32
â
34
,
40
,
57
â
58
,
101
â
102
,
244
social media
Facebook,
15
â
16
,
40
,
58
,
68
,
82
,
89
,
170
,
211
,
215
Sina,
15
Tencent,
15
Twitter,
15
â
16
,
32
,
80
â
82
,
170
,
246
,
248
Weibo,
15