Skip to content
Scan a barcode
Scan
Paperback New Dimensions of Information Warfare Book

ISBN: 3030606201

ISBN13: 9783030606206

New Dimensions of Information Warfare

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: New

$179.99
50 Available
Ships within 2-3 days

Book Overview

Preface.AcknowledgementForewordOrganizationBook structure1. Information DisorderThe new social ecosystemThreat: disinformation campaignAttacksVaccine hesitancyImmigrationClimate changePublic naivetyAlleged political scandalsCountermeasures..Low-quality information.Fake-news detection and removal.Credibility.Spreading truth.Datasets.Malicious actorsSocial botsFake profilesAstroturfSpammersSock puppetsPolitical memesNew directionsEconomyState-sponsored CryptocurrencyThreatCollapse of the cryptocurrenciesAttacks and countermeasuresHash FunctionsOpen IssuesScenario 2: Trust in the Computational Power.Threat: New Technologies.Scenario 3: InfrastructureAttacks and CountermeasureOpen IssuesTowards a State-Sponsored CryptocurrencyBitcoin LimitationsDevelop a State-Sponsored CryptocurrencyScenario 1: Stock market forecastsThreat: Information-based manipulationA large attack surfaceAttacks and countermeasuresOpen issues and future directionsThreat: Trade-based manipulationAttacksCountermeasuresOpen issues and future directionsThreat: Algorithm-based manipulationAlgorithms taking overLoose cannons on the automation deckAttacksCountermeasuresOpen issues and future directionsOther countermeasuresThreat: Technological bias, divide, and monopolyAttacks and countermeasuresOpen issues and future directionsScenario 3: Remote stock marketThreat: Attacks against availabilityAttacks and countermeasuresThreat: Work-from-home perilsAttacksCountermeasuresOpen issues and future directionsScenario 4: Complex financial networksThreat: Systemic risk and cascading failures Measures of systemic riskEconomics and finance approachesNetwork approachesCountermeasuresOpen issues and future directionsPart.- InfrastructureCritical InfrastructureScenario: Cyber Warfare targeting Critical InfrastructuresThreat: MalwareAttacks and CountermeasuresOpen Issues and Future DirectionsScenario: A new Cyber-Physical threat from the skyThreat: DronesAttacks and CountermeasuresOpen Issues and Future DirectionsAttacks and countermeasuresOpen issues and future directionsThreat: outsourcing of securityAttacks and countermeasuresTrust in the cloudSecurity perimeterConfidentialityIntegrityAvailabilityOpen issues and future directionsTechnical sideGlossaryBibliography

Customer Reviews

0 rating
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured