Cyber Warfare

Cyber Warfare

Techniques, Tactics and Tools for Security Practitioners

2nd Edition - October 1, 2013

Write a review

  • Authors: Jason Andress, Steve Winterfeld
  • eBook ISBN: 9780124166332
  • Paperback ISBN: 9780124166721

Purchase options

Purchase options
DRM-free (Mobi, PDF, EPub)
Available
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

Key Features

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Readership

Information security practitioners, network security administrators, computer system administrators, security analysts

Table of Contents

  • Acknowledgments

    Foreword

    Why a Book on Cyber Warfare Is Important

    Why Should You Read This Book

    Introduction

    Abstract

    Book Overview and Key Learning Points

    Book Audience

    How this Book is Organized

    Conclusion

    Chapter 1. What is Cyber Warfare?

    Abstract

    Information in This Chapter

    What is Cyber Warfare?

    Have We Seen a Cyber War?

    Why Cyber Warfare Is Important

    Summary

    References

    Chapter 2. Cyber Threatscape

    Abstract

    Information in This Chapter

    How Did We Get Here?

    Attack Methodology with the Tools and Techniques Used to Execute Them

    Attackers (Major Categories of Threats)

    Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)

    What the Threat Is After (What We Should Focus on Defending)

    Summary

    References

    Chapter 3. The Cyberspace Battlefield

    Abstract

    Information in This Chapter

    Boundaries in Cyber Warfare

    Where Cyber Fits in the War-Fighting Domains

    Review of the Threat Actors

    Fielding Systems at the Speed of Need

    Summary

    References

    Chapter 4. Cyber Doctrine

    Abstract

    Information in This Chapter

    Current U.S. Doctrine

    Sample Doctrine/Strategy from Around the World

    Key Military Principles That Must Be Adapted to Cyber Warfare

    Guidance and Directives

    Operations and Exercises

    Summary

    References

    Chapter 5. Cyber Warriors

    Abstract

    Information in This Chapter

    What Does a Cyber Warrior Look Like?

    Differences from Traditional Forces

    Present Cyber Warfare Forces

    Staffing for Cyber War

    Summary

    References

    Chapter 6. Logical Weapons

    Abstract

    Information in This Chapter

    Reconnaissance Tools

    DNS

    Scanning Tools

    Access and Escalation Tools

    Exfiltration Tools

    Sustainment Tools

    Assault Tools

    Obfuscation Tools

    Summary

    References

    Chapter 7. Physical Weapons

    Abstract

    Information in This Chapter

    How the Logical and Physical Realms Are Connected

    Infrastructure Concerns

    Supply Chain Concerns

    Tools for Physical Attack and Defense

    Summary

    References

    Chapter 8. Psychological Weapons

    Abstract

    Information in This Chapter

    Social Engineering Explained

    How the Military Approaches SE

    How the Military Defends Against SE

    Summary

    References

    Chapter 9. Computer Network Exploitation

    Abstract

    Information in This Chapter

    Intelligence and Counter-Intelligence

    Reconnaissance

    Surveillance

    Summary

    References

    Chapter 10. Computer Network Attack

    Abstract

    Information in This Chapter

    Waging War in the Cyber Era

    The Attack Process

    Summary

    References

    Chapter 11. Computer Network Defense

    Abstract

    Information in This Chapter

    What We Protect

    Security Awareness and Training

    Defending Against Cyber Attacks

    Summary

    References

    Chapter 12. Non-State Actors in Computer Network Operations

    Abstract

    Information in This Chapter

    Individual Actors

    Corporations

    Cyber Terrorism

    Organized Cyber Crime

    Autonomous Actors

    Summary

    References

    Chapter 13. Legal System Impacts

    Abstract

    Information in This Chapter

    Legal Systems

    Key U.S. Laws

    Privacy Impacts

    Digital Forensics

    Summary

    References

    Chapter 14. Ethics

    Abstract

    Information in This Chapter

    Ethics in Cyber Warfare

    Bellum Iustum (Just War Theory)

    Summary

    References

    Chapter 15. Cyberspace Challenges

    Abstract

    Information in This Chapter

    Cybersecurity Issues Defined

    Interrelationship of Cybersecurity Challenges

    Way Ahead

    Summary

    References

    Chapter 16. The Future of Cyber War

    Abstract

    Information in This Chapter

    Emerging Trends

    Trends Driving Where We Will Go

    Summary

    References

    Appendix

    Cyber Timeline

    Index

Product details

  • No. of pages: 324
  • Language: English
  • Copyright: © Syngress 2013
  • Published: October 1, 2013
  • Imprint: Syngress
  • eBook ISBN: 9780124166332
  • Paperback ISBN: 9780124166721

About the Authors

Jason Andress

Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Affiliations and Expertise

CISSP, ISSAP, CISM, GPEN

Steve Winterfeld

Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.

Affiliations and Expertise

(CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity and Military Intelligence.

Ratings and Reviews

Write a review

There are currently no reviews for "Cyber Warfare"