Cyber Warfare, 2nd Edition

Book description

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.

This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Acknowledgments
  6. Foreword
    1. Why a Book on Cyber Warfare Is Important
    2. Why Should You Read This Book
  7. Introduction
    1. Abstract
    2. Book Overview and Key Learning Points
    3. Book Audience
    4. How this Book is Organized
    5. Conclusion
  8. Chapter 1. What is Cyber Warfare?
    1. Abstract
    2. Information in This Chapter
    3. What is Cyber Warfare?
    4. Have We Seen a Cyber War?
    5. Why Cyber Warfare Is Important
    6. Summary
    7. References
  9. Chapter 2. Cyber Threatscape
    1. Abstract
    2. Information in This Chapter
    3. How Did We Get Here?
    4. Attack Methodology with the Tools and Techniques Used to Execute Them
    5. Attackers (Major Categories of Threats)
    6. Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)
    7. What the Threat Is After (What We Should Focus on Defending)
    8. Summary
    9. References
  10. Chapter 3. The Cyberspace Battlefield
    1. Abstract
    2. Information in This Chapter
    3. Boundaries in Cyber Warfare
    4. Where Cyber Fits in the War-Fighting Domains
    5. Review of the Threat Actors
    6. Fielding Systems at the Speed of Need
    7. Summary
    8. References
  11. Chapter 4. Cyber Doctrine
    1. Abstract
    2. Information in This Chapter
    3. Current U.S. Doctrine
    4. Sample Doctrine/Strategy from Around the World
    5. Key Military Principles That Must Be Adapted to Cyber Warfare
    6. Guidance and Directives
    7. Operations and Exercises
    8. Summary
    9. References
  12. Chapter 5. Cyber Warriors
    1. Abstract
    2. Information in This Chapter
    3. What Does a Cyber Warrior Look Like?
    4. Differences from Traditional Forces
    5. Present Cyber Warfare Forces
    6. Staffing for Cyber War
    7. Summary
    8. References
  13. Chapter 6. Logical Weapons
    1. Abstract
    2. Information in This Chapter
    3. Reconnaissance Tools
    4. DNS
    5. Scanning Tools
    6. Access and Escalation Tools
    7. Exfiltration Tools
    8. Sustainment Tools
    9. Assault Tools
    10. Obfuscation Tools
    11. Summary
    12. References
  14. Chapter 7. Physical Weapons
    1. Abstract
    2. Information in This Chapter
    3. How the Logical and Physical Realms Are Connected
    4. Infrastructure Concerns
    5. Supply Chain Concerns
    6. Tools for Physical Attack and Defense
    7. Summary
    8. References
  15. Chapter 8. Psychological Weapons
    1. Abstract
    2. Information in This Chapter
    3. Social Engineering Explained
    4. How the Military Approaches SE
    5. How the Military Defends Against SE
    6. Summary
    7. References
  16. Chapter 9. Computer Network Exploitation
    1. Abstract
    2. Information in This Chapter
    3. Intelligence and Counter-Intelligence
    4. Reconnaissance
    5. Surveillance
    6. Summary
    7. References
  17. Chapter 10. Computer Network Attack
    1. Abstract
    2. Information in This Chapter
    3. Waging War in the Cyber Era
    4. The Attack Process
    5. Summary
    6. References
  18. Chapter 11. Computer Network Defense
    1. Abstract
    2. Information in This Chapter
    3. What We Protect
    4. Security Awareness and Training
    5. Defending Against Cyber Attacks
    6. Summary
    7. References
  19. Chapter 12. Non-State Actors in Computer Network Operations
    1. Abstract
    2. Information in This Chapter
    3. Individual Actors
    4. Corporations
    5. Cyber Terrorism
    6. Organized Cyber Crime
    7. Autonomous Actors
    8. Summary
    9. References
  20. Chapter 13. Legal System Impacts
    1. Abstract
    2. Information in This Chapter
    3. Legal Systems
    4. Key U.S. Laws
    5. Privacy Impacts
    6. Digital Forensics
    7. Summary
    8. References
  21. Chapter 14. Ethics
    1. Abstract
    2. Information in This Chapter
    3. Ethics in Cyber Warfare
    4. Bellum Iustum (Just War Theory)
    5. Summary
    6. References
  22. Chapter 15. Cyberspace Challenges
    1. Abstract
    2. Information in This Chapter
    3. Cybersecurity Issues Defined
    4. Interrelationship of Cybersecurity Challenges
    5. Way Ahead
    6. Summary
    7. References
  23. Chapter 16. The Future of Cyber War
    1. Abstract
    2. Information in This Chapter
    3. Emerging Trends
    4. Trends Driving Where We Will Go
    5. Summary
    6. References
  24. Appendix
    1. Cyber Timeline
  25. Index

Product information

  • Title: Cyber Warfare, 2nd Edition
  • Author(s): Jason Andress, Steve Winterfeld
  • Release date: October 2013
  • Publisher(s): Syngress
  • ISBN: 9780124166332