Counterintelligence in a Cyber World
 
Product details:

ISBN13:9783031352867
ISBN10:3031352866
Binding:Hardback
No. of pages:145 pages
Size:235x155 mm
Weight:424 g
Language:English
Illustrations: XIX, 145 p.
692
Category:

Counterintelligence in a Cyber World

 
Edition number: 2023
Publisher: Springer
Date of Publication:
Number of Volumes: 1 pieces, Book
 
Normal price:

Publisher's listprice:
EUR 64.19
Estimated price in HUF:
26 488 HUF (25 226 HUF + 5% VAT)
Why estimated?
 
Your price:

24 368 (23 208 HUF + 5% VAT )
discount is: 8% (approx 2 119 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Can't you provide more accurate information?
 
  Piece(s)

 
Short description:

This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.

A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.

This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.

Long description:

This book provides an outline of the major challenges and methodologies for applying classic counterintelligence theory into the cybersecurity domain. This book also covers operational security approaches to cyber, alongside detailed descriptions of contemporary cybersecurity threats, in the context of psychological and criminal profiling of cybercriminals. Following an analysis of the plethora of counterespionage techniques that can be mapped to the cyber realm, the mechanics of undertaking technical surveillance are reviewed.

A range of approaches to web and forum surveillance are outlined as a virtual addition to traditional video and audio surveillance captured regarding targets. This includes a description of the advances in Artificial Intelligence, predictive analysis, support for the disciplines of digital forensics, behavioural analysis and Open Source Intelligence (OSINT). The rise of disinformation and misinformation and the veracity of widespread false flag claims are discussed at length, within the broader context of legal and ethical issues in cyber counterintelligence.

This book is designed for professionals working in the intelligence, law enforcement or cybersecurity domains to further explore and examine the contemporary intersection of these disciplines. Students studying cybersecurity, justice, law, intelligence, criminology or related fields may also find the book useful as a reference volume, while instructors could utilise the whole volume or individual chapters as a secondary textbook or required reading.

Table of Contents:
Chapter. 1. Counterintelligence Theory.- Chapter. 2. The Cyber Operational Environment.- Chapter. 3. Cyber Threats (and Opportunities).- Chapter. 4. Psychology and Criminal Profiling.- Chapter. 5. Counterespionage.- Chapter. 6. Technical Surveillance.- Chapter. 7. Physical Surveillance.- Chapter. 8. Data Analysis.- Chapter. 9. Attack Attribution.- Chapter. 10. Practical Deception.- Chapter. 11. Legal Issues in Cyber Counterintelligence.- Chapter. 12. Ethical Issues in Cyber Counterintelligence.