You are previewing The Basics of Cyber Warfare.
O'Reilly logo
The Basics of Cyber Warfare

Book Description

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology.

The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.

  • Provides a sound understanding of the tools and tactics used in cyber warfare.
  • Describes both offensive and defensive tactics from an insider's point of view.
  • Presents doctrine and hands-on techniques to understand as cyber warfare evolves with technology.

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. Author Biography
  7. Introduction
    1. Book Overview and Key Learning Points
    2. Book Audience
    3. How this Book is Organized
    4. Conclusion
  8. Chapter 1. Cyber Threatscape
    1. How Did We Get Here?
    2. Attack Methodology Plus Tools/Techniques Used
    3. Attackers (The Types of Threats)
    4. How Most Organizations Defend Today (Defensive Mountain Range)?
    5. Targeted Capabilities (What We Should be Defending)
    6. Summary
    7. References
  9. Chapter 2. Cyberspace Battlefield Operations
    1. What is Cyber Warfare?
    2. Cyber War—Hype or Reality
    3. Boundaries in Cyber Warfare
    4. Where Cyber Fits in the War-Fighting Domains
    5. Summary
    6. References
  10. Chapter 3. Cyber Doctrine
    1. Current US Doctrine
    2. Sample Doctrine / Strategy From Around the World
    3. Some Key Military Principles that Must be Adapted to Cyber Warfare
    4. Summary
    5. References
  11. Chapter 4. Tools and Techniques
    1. Logical Weapons
    2. Physical Weapons
    3. Summary
    4. References
  12. Chapter 5. Offensive Tactics and Procedures
    1. Computer Network Exploitation
    2. Computer Network Attack
    3. Summary
    4. References
  13. Chapter 6. Psychological Weapons
    1. Social Engineering Explained
    2. How the Military Approaches Social Engineering
    3. How the Military Defends against Social Engineering
    4. Summary
    5. References
  14. Chapter 7. Defensive Tactics and Procedures
    1. What We Protect
    2. Security Awareness and Training
    3. Defending Against Cyber Attacks
    4. Summary
    5. References
  15. Chapter 8. Challenges We Face
    1. Cybersecurity Issues defined
    2. Interrelationship of Cybersecurity Issues
    3. Way Ahead
    4. Summary
    5. References
  16. Chapter 9. Where is Cyber Warfare Headed?
    1. Technology-Based Trends
    2. Policy-Based Trends
    3. How to Defend in Today’s Contested Virtual Environment
    4. Summary
    5. References
  17. Index