

Beschreibung
This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-worl...This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain.
This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains.
The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book.
This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.
Provides a timely, complete and coherent scenario of the new dimensions of Information Warfare (contributions that span from technology to economics), while at the same time following a rigorous yet communicative style Presents recent real-world examples that will help the reader to seize the extent and impact of the menace, and get an understanding of the possible countermeasures, challenges and related trade-offs in information warfare Covers possible attack vectors
Autorentext
Javier Hernandez Fernandez specializes in the area of technology innovation and brings over twenty years of practical experience in overseeing the design and delivery of R&D initiatives on behalf of multi-national companies in the field of IT, telecom, and utilities. He currently manages research and technical consulting projects as part of the Innovation team of Iberdrola, working in the smart grid, renewables, and energy efficiency domains.In addition to a B.Sc. in Computer Science from the University of Ottawa, Javier holds two Masters degrees in Energy Management from the University of Zaragoza and Project Management from the University San Pablo CEU/IEP and a PhD. in Computer Science & Engineering from HBKU. Aymen Omri received the engineering degree in Telecommunications from The Tunisian Aviation Academy EABA, in 2007, and the M.Res. and Ph.D. degrees in Information and Communications Technology (ICT) from the Engineering National School of Tunis (ENIT)/Tunis El Manar University, in 2009 and 2012, respectively. From 2012 to 2017, he was a Postdoctoral Researcher at the Electrical Engineering (EE) Department, Qatar University. From 2018 to 2019, he was a Postdoctoral Researcher at the Department of Electrical and Computer Engineering, Texas A&M University in Qatar. He is currently a Research Scientist at Iberdrola Innovation Middle East / Qatar Science & Technology Park. His research interests include modeling, design, and performance analysis of communication systems. In particular, he has an interest in: 5-G NR Systems, Device to Device Communication Systems, Wireless/Wired Emulation and Experimentation Platforms, and Power Line Communication (PLC) Systems. Roberto Di Pietro, IEEE Fellow, ACM Distinguished Scientist, Member of Academia Europaea, is a Full Professor in Computer Science with the KAUST-CEMSE, Saudi Arabia. Previously, he was Professor in Cybersecurity and founder of the CRI-Lab at HBKU-CES, Doha-Qatar.Before moving to the Middle East, he was in the capacity of Global Head Security Research at Nokia Bell Labs (Paris-France), and Associate Professor (with tenure) of Computer Science at University of Padova, Italy. He has been working in the security field for 25+ years, leading both technology-oriented and research-focused teams in the private sector, government, and academia (MoD, United Nations HQ, EUROJUST, IAEA, WIPO). His main research interests include AI driven cybersecurity, security and privacy for distributed systems (e.g. Blockchain technology, Cloud, IoT, OSNs), virtualization security, applied cryptography, and data science. He has published hundreds of scientific articles on the cited topics, co-authored four books, and registered tens of patents and patents applications. Other than being involved in M&A of start-ups -and having founded one (exited)-, he is in the Board of research centers and start-ups. In 2011-2012 he was awarded a Chair of Excellence from UniversityCarlos III, Madrid. In 2020 he received the JeanClaude Laprie Award for having significantly influenced the theory and practice of Dependable Computing. In 2022 he was awarded the Individual Innovation Award from HBKU. He is consistently ranked among the 2% top world scientists since this ranking existed.
Klappentext
Preface.- Acknowledgements.- Foreword.- Organization.- Book structure.- 1. Information Disorder.- The new social ecosystem.- Threat: disinformation campaign.- Attacks.- Vaccine hesitancy.- Immigration.- Climate change.- Public naivety.- Alleged political scandals.- Countermeasures.- Low-quality information.- Fake-news detection and removal.- Credibility.- Spreading truth.- Datasets.- Malicious actors.- Social bots.- Fake profiles.- Astroturf.- Spammers.- Sock puppets.- Political memes.- New directions.- Part.- Economy.- State-sponsored Cryptocurrency.- Threat: Collapse of the cryptocurrencies.- Attacks and countermeasures.- Hash Functions.- Open Issues.- Scenario 2: Trust in the Computational Power.- Threat: New Technologies.- Scenario 3: Infrastructure.- Attacks and Countermeasures.- Open Issues.- Towards a State-Sponsored Cryptocurrency.- Bitcoin Limitations.- Develop a State-Sponsored Cryptocurrency.- Scenario 1: Stock market forecasts.- Threat: Information-based manipulation.- A large attack surface.- Attacks and countermeasures.- Open issues and future directions.- Threat: Trade-based manipulation.- Attacks.- Countermeasures.- Open issues and future directions.- Threat: Algorithm-based manipulation.- Algorithms taking over.- Loose cannons on the automation deck.- Attacks.- Countermeasures.- Open issues and future directions.- Other countermeasures.- Threat: Technological bias, divide, and monopoly.- Attacks and countermeasures.- Open issues and future directions.- Scenario 3: Remote stock market.- Threat: Attacks against availability.- Attacks and countermeasures.- Threat: Work-from-home perils.- Attacks.- Countermeasures.- Open issues and future directions.- Scenario 4: Complex financial networks.- Threat: Systemic risk and cascading failures.- Measures of systemic risk.- Economics and finance approaches.- Network approaches.- Countermeasures.- Open issues and future directions. Part.- Infrastructure.- Critical Infrastructure.- Scenario: Cyber Warfare targeting Critical Infrastr…
10%
