- Provides a sound understanding of the tools and tactics used in cyber warfare.
- Describes both offensive and defensive tactics from an insider's point of view.
- Presents doctrine and hands-on techniques to understand as cyber warfare evolves with technology.
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).
Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology.
The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
Information Security professionals, hackers, penetration testers, systems administrators, CIOs, as well as information security students.
The Basics of Cyber Warfare, 1st Edition
Book Overview and Key Learning Points
How this Book is Organized
Chapter 1. Cyber Threatscape
How Did We Get Here?
Attack Methodology Plus Tools/Techniques Used
Attackers (The Types of Threats)
How Most Organizations Defend Today (Defensive Mountain Range)?
Targeted Capabilities (What We Should be Defending)
Chapter 2. Cyberspace Battlefield Operations
What is Cyber Warfare?
Cyber War—Hype or Reality
Boundaries in Cyber Warfare
Where Cyber Fits in the War-Fighting Domains
Chapter 3. Cyber Doctrine
Current US Doctrine
Sample Doctrine / Strategy From Around the World
Some Key Military Principles that Must be Adapted to Cyber Warfare
Chapter 4. Tools and Techniques
Chapter 5. Offensive Tactics and Procedures
Computer Network Exploitation
Computer Network Attack
Chapter 6. Psychological Weapons
Social Engineering Explained
How the Military Approaches Social Engineering
How the Military Defends against Social Engineering
Chapter 7. Defensive Tactics and Procedures
What We Protect
Security Awareness and Training
Defending Against Cyber Attacks
Chapter 8. Challenges We Face
Cybersecurity Issues defined
Interrelationship of Cybersecurity Issues
Chapter 9. Where is Cyber Warfare Headed?
How to Defend in Today’s Contested Virtual Environment