Cyber Warfare - 2nd Edition - ISBN: 9780124166721, 9780124166332

Cyber Warfare

2nd Edition

Techniques, Tactics and Tools for Security Practitioners

Authors: Jason Andress Steve Winterfeld
eBook ISBN: 9780124166332
Paperback ISBN: 9780124166721
Imprint: Syngress
Published Date: 16th October 2013
Page Count: 324
Sales tax will be calculated at check-out Price includes VAT/GST
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
31.95
23.96
23.96
23.96
23.96
23.96
25.56
25.56
24.99
18.74
18.74
18.74
18.74
18.74
19.99
19.99
39.95
29.96
29.96
29.96
29.96
29.96
31.96
31.96
Unavailable
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.

This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

Key Features

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Readership

Information security practitioners, network security administrators, computer system administrators, security analysts

Table of Contents

Acknowledgments

Foreword

Why a Book on Cyber Warfare Is Important

Why Should You Read This Book

Introduction

Abstract

Book Overview and Key Learning Points

Book Audience

How this Book is Organized

Conclusion

Chapter 1. What is Cyber Warfare?

Abstract

Information in This Chapter

What is Cyber Warfare?

Have We Seen a Cyber War?

Why Cyber Warfare Is Important

Summary

References

Chapter 2. Cyber Threatscape

Abstract

Information in This Chapter

How Did We Get Here?

Attack Methodology with the Tools and Techniques Used to Execute Them

Attackers (Major Categories of Threats)

Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)

What the Threat Is After (What We Should Focus on Defending)

Summary

References

Chapter 3. The Cyberspace Battlefield

Abstract

Information in This Chapter

Boundaries in Cyber Warfare

Where Cyber Fits in the War-Fighting Domains

Review of the Threat Actors

Fielding Systems at the Speed of Need

Summary

References

Chapter 4. Cyber Doctrine

Abstract

Information in This Chapter

Current U.S. Doctrine

Sample Doctrine/Strategy from Around the World

Key Military Principles That Must Be Adapted to Cyber Warfare

Guidance and Directives

Operations and Exercises

Summary

References

Chapter 5. Cyber Warriors

Abstract

Information in This Chapter

What Does a Cyber Warrior Look Like?

Differences from Traditional Forces

Present Cyber Warfare Forces

Staffing for Cyber War

Summary

References

Chapter 6. Logical Weapons

Abstract

Information in This Chapter

Reconnaissance Tools

DNS

Scanning Tools

Access and Escalation Tools

Exfiltration Tools

Sustainment Tools

Assault Tools

Obfuscation Tools

Summary

References

Chapter 7. Physical Weapons

Abstract

Information in This Chapter

How the Logical and Physical Realms Are Connected

Infrastructure Concerns

Supply Chain Concerns

Tools for Physical Attack and Defense

Summary

References

Chapter 8. Psychological Weapons

Abstract

Information in This Chapter

Social Engineering Explained

How the Military Approaches SE

How the Military Defends Against SE

Summary

References

Chapter 9. Computer Network Exploitation

Abstract

Information in This Chapter

Intelligence and Counter-Intelligence

Reconnaissance

Surveillance

Summary

References

Chapter 10. Computer Network Attack

Abstract

Information in This Chapter

Waging War in the Cyber Era

The Attack Process

Summary

References

Chapter 11. Computer Network Defense

Abstract

Information in This Chapter

What We Protect

Security Awareness and Training

Defending Against Cyber Attacks

Summary

References

Chapter 12. Non-State Actors in Computer Network Operations

Abstract

Information in This Chapter

Individual Actors

Corporations

Cyber Terrorism

Organized Cyber Crime

Autonomous Actors

Summary

References

Chapter 13. Legal System Impacts

Abstract

Information in This Chapter

Legal Systems

Key U.S. Laws

Privacy Impacts

Digital Forensics

Summary

References

Chapter 14. Ethics

Abstract

Information in This Chapter

Ethics in Cyber Warfare

Bellum Iustum (Just War Theory)

Summary

References

Chapter 15. Cyberspace Challenges

Abstract

Information in This Chapter

Cybersecurity Issues Defined

Interrelationship of Cybersecurity Challenges

Way Ahead

Summary

References

Chapter 16. The Future of Cyber War

Abstract

Information in This Chapter

Emerging Trends

Trends Driving Where We Will Go

Summary

References

Appendix

Cyber Timeline

Index

Details

No. of pages:
324
Language:
English
Copyright:
© Syngress 2014
Published:
Imprint:
Syngress
eBook ISBN:
9780124166332
Paperback ISBN:
9780124166721

About the Author

Jason Andress

Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Affiliations and Expertise

CISSP, ISSAP, CISM, GPEN

Steve Winterfeld

Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.

Affiliations and Expertise

(CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity and Military Intelligence.

Reviews

"A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications

Ratings and Reviews