LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and technique… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.
This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.
This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
Acknowledgments
Foreword
Why a Book on Cyber Warfare Is Important
Why Should You Read This Book
Introduction
Abstract
Book Overview and Key Learning Points
Book Audience
How this Book is Organized
Conclusion
Chapter 1. What is Cyber Warfare?
Abstract
Information in This Chapter
What is Cyber Warfare?
Have We Seen a Cyber War?
Why Cyber Warfare Is Important
Summary
References
Chapter 2. Cyber Threatscape
Abstract
Information in This Chapter
How Did We Get Here?
Attack Methodology with the Tools and Techniques Used to Execute Them
Attackers (Major Categories of Threats)
Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)
What the Threat Is After (What We Should Focus on Defending)
Summary
References
Chapter 3. The Cyberspace Battlefield
Abstract
Information in This Chapter
Boundaries in Cyber Warfare
Where Cyber Fits in the War-Fighting Domains
Review of the Threat Actors
Fielding Systems at the Speed of Need
Summary
References
Chapter 4. Cyber Doctrine
Abstract
Information in This Chapter
Current U.S. Doctrine
Sample Doctrine/Strategy from Around the World
Key Military Principles That Must Be Adapted to Cyber Warfare
Guidance and Directives
Operations and Exercises
Summary
References
Chapter 5. Cyber Warriors
Abstract
Information in This Chapter
What Does a Cyber Warrior Look Like?
Differences from Traditional Forces
Present Cyber Warfare Forces
Staffing for Cyber War
Summary
References
Chapter 6. Logical Weapons
Abstract
Information in This Chapter
Reconnaissance Tools
DNS
Scanning Tools
Access and Escalation Tools
Exfiltration Tools
Sustainment Tools
Assault Tools
Obfuscation Tools
Summary
References
Chapter 7. Physical Weapons
Abstract
Information in This Chapter
How the Logical and Physical Realms Are Connected
Infrastructure Concerns
Supply Chain Concerns
Tools for Physical Attack and Defense
Summary
References
Chapter 8. Psychological Weapons
Abstract
Information in This Chapter
Social Engineering Explained
How the Military Approaches SE
How the Military Defends Against SE
Summary
References
Chapter 9. Computer Network Exploitation
Abstract
Information in This Chapter
Intelligence and Counter-Intelligence
Reconnaissance
Surveillance
Summary
References
Chapter 10. Computer Network Attack
Abstract
Information in This Chapter
Waging War in the Cyber Era
The Attack Process
Summary
References
Chapter 11. Computer Network Defense
Abstract
Information in This Chapter
What We Protect
Security Awareness and Training
Defending Against Cyber Attacks
Summary
References
Chapter 12. Non-State Actors in Computer Network Operations
Abstract
Information in This Chapter
Individual Actors
Corporations
Cyber Terrorism
Organized Cyber Crime
Autonomous Actors
Summary
References
Chapter 13. Legal System Impacts
Abstract
Information in This Chapter
Legal Systems
Key U.S. Laws
Privacy Impacts
Digital Forensics
Summary
References
Chapter 14. Ethics
Abstract
Information in This Chapter
Ethics in Cyber Warfare
Bellum Iustum (Just War Theory)
Summary
References
Chapter 15. Cyberspace Challenges
Abstract
Information in This Chapter
Cybersecurity Issues Defined
Interrelationship of Cybersecurity Challenges
Way Ahead
Summary
References
Chapter 16. The Future of Cyber War
Abstract
Information in This Chapter
Emerging Trends
Trends Driving Where We Will Go
Summary
References
Appendix
Cyber Timeline
Index
JA
SW