Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.

Key Features

  • Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play
  • Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)
  • Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec
  • Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent


Information security professionals, system administrators. Security managers, security analysts. defense analysts, defense personnel, U.S Cybercom staff

Table of Contents






Chapter 1. Cyber Warfare: Here and Now

Information in this Chapter

What Is Cyber War?

Is Cyber War a Credible Threat?

Attribution, Deception, and Intelligence

Information Assurance


I: Cyber Attack

Part I Cyber Attack

Chapter 2. Political Cyber Attack Comes of Age in 2007

Information in this Chapter

Reliance on Information as a Vulnerability

Rudimentary but Effective: Denial of Service

Leaving Unwanted Messages: Web Site Defacement

Tools for Denial of Service

The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack

Estonia Is Hit by Cyber Attacks

General Response to DDoS


Suggested Further Reading


Chapter 3. How Cyber Attacks Augmented Russian Military Operations

Information in This Chapter

The 2008 Russian Cyber Campaign Against Georgia

What Is Interesting About the Russian Cyber Campaign

Preparing for a Cyber-Capable Adversary


Suggested Further Reading


Chapter 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East

Information in this Chapter

Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah “July War” of 2006

Civilians in the Cyber Melee: Operation Cast Lead


Suggested Further Reading


Chapter 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia

Information in This Chapter

DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks

Silencing Novaya Gazeta and Other Russian Dissidents

Iran—How the 2009 Elec


No. of pages:
© 2013
Print ISBN:
Electronic ISBN:

About the authors

Paulo Shakarian

Paulo Shakarian, Ph.D. is a Major in the U.S. Army and an Assistant Professor of Computer Science at the U.S. Military Academy (West Point) teaching classes on computer science and information technology as wells as conducting research on cyber-security, social networks, and artificial intelligence. He has written over twenty papers published in scientific and military journals. Relating to cyber-warfare, he has written the paper “Stuxnet: Cyberwar Revolution in Military Affairs” published in Small Wars Journal and “The 2008 Russian Cyber-Campaign Against Georgia” published in Military Review. His scientific research has also been well received, featured in major news media such including The Economist and Nature. Previously, he has authored Geospatial Abduction: Principles and Practice published by Springer. Paulo holds a Ph.D. and M.S. in computer science from the University of Maryland, College Park, a B.S. in computer science from West Point, and a Depth of Study in Information Assurance also from West Point. Paulo has served two combat tours in Operation Iraqi Freedom. His military awards include the Bronze Star, Meritorious Service Medal, Army Commendation Medal with Valor Device, and Combat Action Badge. Paulo’s website is:


" excellent overview of the topic…It looks at the information security aspect of cyberwarfare, as well the military, sociological and other aspects…this book should indeed be read by everyone in Washington, as they are making decisions on the topic, without truly understanding it.", ,August 4 2014