Skip to main content
Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

1. Information Weapon: Concepts, Means, Methods, and Examples of Application

verfasst von : Anatoly Belous, Vitali Saladukha

Erschienen in: Viruses, Hardware and Software Trojans

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter is dedicated to the analysis of concepts, means, and methods of implementation of new dangerous and effective information technology weapons (cyberweapons). For a deeper understanding of all aspects related to the development and application features of cyberweapons, the following issues are consistently discussed in this chapter: principles of ensuring information security of a sovereign state, main methods of modern information warfare. Information technology impacts are defined and classified, the most common of them are discussed in detail along with various technical channels of information leakage. Additionally, there are a number of examples of the use of this type of weapon.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A.I. Belous, V.A. Solodukha, S.V. Shvedov, Software and hardware Trojans—methods of implementation and methods of counteraction, in The First Technical Encyclopedia, 2 vol., Moscow, TECHNOSPHERE (2018), 688 p. ISBN 978-5-94836-524-4 A.I. Belous, V.A. Solodukha, S.V. Shvedov, Software and hardware Trojans—methods of implementation and methods of counteraction, in The First Technical Encyclopedia, 2 vol., Moscow, TECHNOSPHERE (2018), 688 p. ISBN 978-5-94836-524-4
2.
Zurück zum Zitat G.G. Pocheptsov, Information wars and the future (2002) G.G. Pocheptsov, Information wars and the future (2002)
3.
Zurück zum Zitat A.V. Manoylo, State information policy in special conditions: monograph (MEPI, 2003) A.V. Manoylo, State information policy in special conditions: monograph (MEPI, 2003)
4.
Zurück zum Zitat A.V. Manoylo, A.I. Petrenko, D.B. Frolov, State Information Policy in the Context of the Information and Psychological War: Monograph (Goryachaya Linia—Telecom, 2003) A.V. Manoylo, A.I. Petrenko, D.B. Frolov, State Information Policy in the Context of the Information and Psychological War: Monograph (Goryachaya Linia—Telecom, 2003)
6.
Zurück zum Zitat S.I. Makarenko, I.I. Chuklyaev, Terminological basis in the field of information confrontation. Cybersecur. Issues 1(2), 13–21 (2014) S.I. Makarenko, I.I. Chuklyaev, Terminological basis in the field of information confrontation. Cybersecur. Issues 1(2), 13–21 (2014)
7.
Zurück zum Zitat S.N. Grinyaev, The Battlefield—Cyberspace. Theory, techniques, tools, methods and systems of information warfare (Harvest, 2004), 426 p S.N. Grinyaev, The Battlefield—Cyberspace. Theory, techniques, tools, methods and systems of information warfare (Harvest, 2004), 426 p
8.
Zurück zum Zitat V.F. Prokofiev, The secret weapon of information war. Impact on the subconscious (Sinteg, 2003), 430 p V.F. Prokofiev, The secret weapon of information war. Impact on the subconscious (Sinteg, 2003), 430 p
9.
Zurück zum Zitat S.P. Rastorguev, Information war (Radio and Communication, 1999), 416 p S.P. Rastorguev, Information war (Radio and Communication, 1999), 416 p
10.
Zurück zum Zitat V.M. Burenok,A.A. Ivlev, V.Y. Korchak, The development of military technology of the XXI century: problems, planning, implementation (Kupol Publishing House, Tver, 2009), 624 p V.M. Burenok,A.A. Ivlev, V.Y. Korchak, The development of military technology of the XXI century: problems, planning, implementation (Kupol Publishing House, Tver, 2009), 624 p
11.
Zurück zum Zitat S.A. Parshin, Y.E. Gorbachev, Y.A. Kozhanov Cyber war is a real threat to national security (KRASAND, 2011), 96 p S.A. Parshin, Y.E. Gorbachev, Y.A. Kozhanov Cyber ​​war is a real threat to national security (KRASAND, 2011), 96 p
12.
Zurück zum Zitat N.P. Shekhovtsov, Y.E. Kuleshov, Information weapon: theory and practice of application in the information confrontation. Bull. Acad. Mil. Sci. 1(38), 35–40 (2012) N.P. Shekhovtsov, Y.E. Kuleshov, Information weapon: theory and practice of application in the information confrontation. Bull. Acad. Mil. Sci. 1(38), 35–40 (2012)
13.
Zurück zum Zitat JP 3–13.1, Electronic Warfare. US Joint Chiefs of Staff (2007), 115 p JP 3–13.1, Electronic Warfare. US Joint Chiefs of Staff (2007), 115 p
14.
Zurück zum Zitat Problems of software security/Ed. Pd Zegdzhu (GTU, 1995), 200 p Problems of software security/Ed. Pd Zegdzhu (GTU, 1995), 200 p
15.
Zurück zum Zitat S.I. Makarenko, Information Security: A textbook for university students. Stavropol: SF MGGU them. M.A. Sholokhov (2009), 372 p S.I. Makarenko, Information Security: A textbook for university students. Stavropol: SF MGGU them. M.A. Sholokhov (2009), 372 p
16.
Zurück zum Zitat I.D. Medvedovsky, P.V. Semenov, V.V. Platonov, Attack via the Internet/Eds. P.S. Zegdzhu. SPb.: Ed. NGO “Peace and Family-95” (1997), 277 p I.D. Medvedovsky, P.V. Semenov, V.V. Platonov, Attack via the Internet/Eds. P.S. Zegdzhu. SPb.: Ed. NGO “Peace and Family-95” (1997), 277 p
18.
Zurück zum Zitat GOST R 50922-2006, Protection of information. Basic terms and definitions, 2008-02-01 (Standartinform, 2007), 12 p GOST R 50922-2006, Protection of information. Basic terms and definitions, 2008-02-01 (Standartinform, 2007), 12 p
19.
Zurück zum Zitat Technical protection of information. Basic terms and definitions: recommendations for standardization R 50.1.056-2005: approved by Order of Rostechregulirovanie on December 29, 2005 № 479-st. Introduced in 2006-06-01 (Standartinform, 2006), 16 p Technical protection of information. Basic terms and definitions: recommendations for standardization R 50.1.056-2005: approved by Order of Rostechregulirovanie on December 29, 2005 № 479-st. Introduced in 2006-06-01 (Standartinform, 2006), 16 p
20.
Zurück zum Zitat GOST R 51275-2006, Protection of information. The object of informatization. Factors affecting information. General provisions. Instead of GOST R 51275-99; 2008-02-01 (Standardinform, 2007), 6 p GOST R 51275-2006, Protection of information. The object of informatization. Factors affecting information. General provisions. Instead of GOST R 51275-99; 2008-02-01 (Standardinform, 2007), 6 p
21.
Zurück zum Zitat Information security terminology: Handbook (VNII Standard, 1993), 110 p Information security terminology: Handbook (VNII Standard, 1993), 110 p
22.
Zurück zum Zitat A.A. Khorev, Technical protection of information: Textbook, in Technical Channels of Information Leakage (3 vol.), vol. 1 (NPT “Analytics”, Moscow, 2008), 436 p A.A. Khorev, Technical protection of information: Textbook, in Technical Channels of Information Leakage (3 vol.), vol. 1 (NPT “Analytics”, Moscow, 2008), 436 p
23.
Zurück zum Zitat G.A. Buzov, S.V. Kalinin, A.V. Kondratiev, Protection against information leakage through technical channels (Hotline—Telecom, 2005), 416 p G.A. Buzov, S.V. Kalinin, A.V. Kondratiev, Protection against information leakage through technical channels (Hotline—Telecom, 2005), 416 p
24.
Zurück zum Zitat GOST 23611-79, Electromagnetic compatibility of radio electronic means. Terms and Definitions, 1980-07-01 (Standartinform, 2005),10 p GOST 23611-79, Electromagnetic compatibility of radio electronic means. Terms and Definitions, 1980-07-01 (Standartinform, 2005),10 p
25.
Zurück zum Zitat GOST 24375-80, Radio communication. Terms and Definitions, 1982-01-01 (Standardinform, 2005), 123 p GOST 24375-80, Radio communication. Terms and Definitions, 1982-01-01 (Standardinform, 2005), 123 p
28.
Zurück zum Zitat V.K. Novikov, Information weapons—weapons of modern and future wars (Goryachaya linia—Telecom, 2011), 264 p V.K. Novikov, Information weapons—weapons of modern and future wars (Goryachaya linia—Telecom, 2011), 264 p
29.
Zurück zum Zitat Computer Keyboard Monitoring: product range (B.E.A. S.r.l., Italy, Torino, 2007), pp. 35–37 Computer Keyboard Monitoring: product range (B.E.A. S.r.l., Italy, Torino, 2007), pp. 35–37
33.
Zurück zum Zitat S. Barnum, Common Attack Pattern Enumeration and Classification (CAPEC) Schema Description, vol. 3 (Cigital Inc., 2008) S. Barnum, Common Attack Pattern Enumeration and Classification (CAPEC) Schema Description, vol. 3 (Cigital Inc., 2008)
37.
Zurück zum Zitat E.S. Larina, V.S. Ovchinsky, Cyberwars of the 21th century. What Edward Snowden did not say (Knizhnyi mir, 2014), 352 p E.S. Larina, V.S. Ovchinsky, Cyberwars of the 21th century. What Edward Snowden did not say (Knizhnyi mir, 2014), 352 p
38.
Zurück zum Zitat V.D. Popov, State information policy: condition and problems of formation (Moscow, 2002) V.D. Popov, State information policy: condition and problems of formation (Moscow, 2002)
39.
Zurück zum Zitat V.D. Popov, Informatology and information policy (Publishing House of RAGS, 2001) V.D. Popov, Informatology and information policy (Publishing House of RAGS, 2001)
40.
Zurück zum Zitat R.A. Poisel, Information Warfare and Electronic Warfare Systems. Artech House, 685, Canton Street Norwood, MA 02062 (2013) R.A. Poisel, Information Warfare and Electronic Warfare Systems. Artech House, 685, Canton Street Norwood, MA 02062 (2013)
41.
Zurück zum Zitat S.I. Makarenko, I.I. Chucklyaev, The terminological basis of the informational conflict area. Voprosy kiberbezopasnosti 2(1), 13–21 (2014) (in Russian) S.I. Makarenko, I.I. Chucklyaev, The terminological basis of the informational conflict area. Voprosy kiberbezopasnosti 2(1), 13–21 (2014) (in Russian)
42.
Zurück zum Zitat S.N. Griniaev, Pole bitvy—kiberprostranstvo. Teoriia, priemy, sredstva, metody i sistemy vedeniia informatsionnoi voiny [Battlefield—cyberspace. Theory, techniques, tools, methods and systems of information warfare] (Kharvest Public, Moscow, 2004), 426 p. (in Russian S.N. Griniaev, Pole bitvy—kiberprostranstvo. Teoriia, priemy, sredstva, metody i sistemy vedeniia informatsionnoi voiny [Battlefield—cyberspace. Theory, techniques, tools, methods and systems of information warfare] (Kharvest Public, Moscow, 2004), 426 p. (in Russian
Metadaten
Titel
Information Weapon: Concepts, Means, Methods, and Examples of Application
verfasst von
Anatoly Belous
Vitali Saladukha
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-47218-4_1

Neuer Inhalt