Description

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors—our defenses must be ready all the time and our alert systems must detect the threats every time.

Key Features

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Readership

Information security practitioners, network security administrators, computer system administrators, security analysts

Table of Contents

Acknowledgments

Foreword

Why a Book on Cyber Warfare Is Important

Why Should You Read This Book

Introduction

Abstract

Book Overview and Key Learning Points

Book Audience

How this Book is Organized

Conclusion

Chapter 1. What is Cyber Warfare?

Abstract

Information in This Chapter

What is Cyber Warfare?

Have We Seen a Cyber War?

Why Cyber Warfare Is Important

Summary

References

Chapter 2. Cyber Threatscape

Abstract

Information in This Chapter

How Did We Get Here?

Attack Methodology with the Tools and Techniques Used to Execute Them

Attackers (Major Categories of Threats)

Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)

What the Threat Is After (What We Should Focus on Defending)

Summary

References

Chapter 3. The Cyberspace Battlefield

Abstract

Information in This Chapter

Boundaries in Cyber Warfare

Where Cyber Fits in the War-Fighting Domains

Review of the Threat Actors

Fielding Systems at the Speed of Need

Summary

References

Chapter 4. Cyber Doctrine

Abstract

Information in This Chapter

Current U.S. Doctrine

Sample Doctrine/Strategy from Around the World

Key Military Principles That Must Be Adapted to Cyber Warfare

Guidance and Directives

Operations and Exercises

Summary

References

Chapter 5. Cyber Warriors

Abstract

Information in This Chapter

What Does a Cyber Warrior Look Like?

Differences from Traditional Forces

Present Cyber Warfare Forces

Staffing for Cyber War

Summary

References

Chapter 6. Logical Weapons

Abstract

Information in This Chapter

Reconnaissance Tools<

Details

No. of pages:
324
Language:
English
Copyright:
© 2014
Published:
Imprint:
Syngress
Print ISBN:
9780124166721
Electronic ISBN:
9780124166332

Reviews

"A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications