Cyber warfare techniques, tactics and tools for security practitioners
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will ch...
Autor principal: | |
---|---|
Otros Autores: | , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, Mass. :
Syngress
c2011.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628313806719 |
Tabla de Contenidos:
- Front Cover; Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners; Copyright Page; Acknowledgments; Table of Contents; About the Authors; About the Technical Editor; Foreword; Introduction; Chapter1. What is Cyber Warfare?; What is Cyber Warfare?; Have We Seen a Cyber War?; Why Cyber Warfare is Important; Summary; Endnotes; Chapter2. The Cyberspace Battlefield; Boundaries in Cyber Warfare; Where Cyber Fits in the War-fighting Domains; Threatscape; Fielding Systems at the Speed of Need; Summary; Endnotes; Chapter3. Cyber Doctrine; Current U.S. Doctrine
- Sample Doctrine/Strategy from Around the WorldTranslating Traditional Military Doctrine; Guidance and Directives; Operations and Exercises; Summary; Endnotes; Chapter4. Cyber Warriors; What Does a Cyber Warrior Look Like?; Differences from Traditional Forces; Present Cyber Warfare Forces; Staffing for Cyber War; Summary; Endnotes; Chapter5. Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Summary; Endnotes; Chapter6. Physical Weapons; How the Logical and Physical Realms are Connected
- Infrastructure ConcernsSupply Chain Concerns; Tools for Physical Attack and Defense; Summary; Endnotes; Chapter7. Psychological Weapons; Social Engineering Explained; How the Military Approaches Social Engineering; How the Military Defends Against Social Engineering; Summary; Endnotes; Chapter8. Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Surveillance; Summary; Endnotes; Chapter9. Computer Network Attack; Waging War in the Cyber Era; The Attack Process; Summary; Endnotes; Chapter10. Computer Network Defense; What We Protect
- Security Awareness and TrainingDefending against Cyber Attacks; Summary; Endnotes; Chapter11. Non-State Actors in Computer Network Operations; Individual Actors; Corporations; Cyber Terrorism; Organized Cyber Crime; Autonomous Actors; Summary; Endnotes; Chapter12. Legal System Impacts; Legal Systems; Key U.S. Laws; Privacy Impacts; Digital Forensics; Summary; Endnotes; Chapter13. Ethics; Ethics in Cyber Warfare; Bellum Iustum (Just War Theory); Summary; Endnotes; Chapter14. Cyberspace Challenges; Cybersecurity Issues Defined; Interrelationship of Cybersecurity Issues; Way Ahead; Summary
- EndnotesChapter15. The Future of Cyber War; Near Term Trends; Most Likely and Most Dangerous Courses of Action; New Technologies and New problems; International Interactions; Summary; Endnotes; Appendix: Cyber Timeline; Index