• Complain

Stanislav Abaimov - Cyber Arms: Security in Cyberspace

Here you can read online Stanislav Abaimov - Cyber Arms: Security in Cyberspace full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: CRC Press, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Stanislav Abaimov Cyber Arms: Security in Cyberspace

Cyber Arms: Security in Cyberspace: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cyber Arms: Security in Cyberspace" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure.

The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives.

Stanislav Abaimov: author's other books


Who wrote Cyber Arms: Security in Cyberspace? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cyber Arms: Security in Cyberspace — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cyber Arms: Security in Cyberspace" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
1
Cyber Offence Landscape

O divine art of subtlety and secrecy!

Through you we learn to be invisible, through you inaudible; and hence we can hold the enemys fate in our hands.

The Art of War

Sun Tzu, The Art of War, Canterbury Classics, 2016, book VI, Printers Row Publishing Group (PRPG), San Diego, USA, p. 13.

The invention of computerised communication revolutionised human life, enhanced human interaction, accelerated business management, and skyrocketed scientific research. Along with these benefits came the new unknown threats, stealthy cyber weapons and the fifth military domain.

Originally, malicious cyber codes were used for jokes and creative art projects. Over time, the application of malware revealed its offensive potential and attracted the attention of cyber-crime. Advanced cyber arms and weapons are now developed and produced by the flourishing cyber industry, and widely acquired and used by criminals, terrorists, national intelligence services, military forces, etc.

For the purpose of clarity in this book, we distinguish cyber armsas software able to function as an independent agent, cyber toolsas cyber arms used for specific purposes, and cyber-physical weaponsto be physical weapons, i.e. robots, drones, with cyber command and control systems.

1.1.1Cyber Arms Assortment

Cyberspace, an artificially created virtual reality, is inhabited by software able to implement certain functions. Specific pieces of code that can act as independent agents and run commands are called cyber arms. These have a dual-use nature and, depending on the aim of application, they can be used both as a cyber-security tool as well as a cyber-weapon.

The anthology below covers the evolution of selected malware, i.e. viruses, worms, trojans, bots, ransomware, implants, as well as cryptominers, and highlights the increased scope of its destructive potential. Its history dates to the production of the first computer and cyberspace itself.

The end of the 1930s was marked by the birth of the first electric programmable computer, the Colossus, the 1940s by the first digital computers, the 1950s by computers capable of storing and running programs from memory and the first commercial scientific computers. Since that time, the computer race has only been escalating and the inquisitive human minds dedicated their efforts and intelligence to improve the new virtual reality and harness all its benefits.

The predecessors of modern cyberarms were harmless minimalistic programs that resembled games and sent cryptic messages to users. The programmers and fiction writers of 1970s80s were enthusiastic in developing visionary ideas about the potential of this emerging virtual reality. The following examples illustrate four decades of cyber arms evolution, from their stone age where they were prank viruses to the current state of AI-empowered malware frameworks.

1949

Over 20 years before the creation of the first malware,

, last retrieved on 14 June 2018
1971

The Creeper Virus, commonly recognised as the first computer virus, is released. Created as an experimental self-duplicating program to illustrate a mobile application, it located a computer in the network, copied itself inside the computer, simulated the printing process, destroyed the file, and displayed a message on the screen Im the creeper, catch me if you can! It was also able to duplicate itself erasing previous versions. The piece of code named the Reaper was created to counter Creeper virus and, thus, became one of the first examples of an anti-virus program.

Two years later, Michael Crichtons movie Westworld screened the first concept of a computer virus, causing inexplicable problems and breakdowns spreading like a disease between the androids.

1974

The Rabbit (or Wabbit) virus is developed. It overloaded the computer resources by multiplying itself until it blocked the system, reduced its performance, and crashed the computer. Today, it would have been named a fork bomb as it caused a Denial-of-Service (DoS) attack.

John Brunners novel The Shockwave Rider , published in 1975, coined the word worm to describe a self-replicating program that propagates itself through a computer network.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cyber Arms: Security in Cyberspace»

Look at similar books to Cyber Arms: Security in Cyberspace. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cyber Arms: Security in Cyberspace»

Discussion, reviews of the book Cyber Arms: Security in Cyberspace and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.