Index
Note: Page numbers followed by f indicate figures.
A
Advanced persistent threat (APT)
cyber operations, 133
defined, 132
AnonPaste, 94
AnonTune, 93
Anonymous-OS 0.1/Live, 94–95
Anonymous timeline, 257
APT. See Advanced persistent threat (APT)
Arab Spring, 90–91
Aramco, 58
AS. See Äutonomous system (AS)
Aurora Test
description, 213
implementation, 215–217
vulnerability, 214–215
Autonomous system (AS), 37
B
Battlefield operating system (BOS), 29–30
BGP. See Border gateway protocol (BGP)
Border gateway routers, 37
BOS. See Battlefield operating system (BOS)
C
Cascading failure
computer networks, 220–221
power-grid network, 219–220
CCC. See Chaos Computer Club (CCC)
C&C servers. See Command and control ...
Get Introduction to Cyber-Warfare now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.