E-Book, Englisch, 320 Seiten
Andress / Winterfeld Cyber Warfare
1. Auflage 2011
ISBN: 978-1-59749-638-4
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Techniques, Tactics and Tools for Security Practitioners
E-Book, Englisch, 320 Seiten
ISBN: 978-1-59749-638-4
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The concepts discussed will give students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It considers relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Starting with a definition of cyber warfare, the book's 15 chapters discuss the following topics: the cyberspace battlefield; cyber doctrine; cyber warriors; logical, physical, and psychological weapons; computer network exploitation; computer network attack and defense; non-state actors in computer network operations; legal system impacts; ethics in cyber warfare; cyberspace challenges; and the future of cyber war. This book is a valuable resource to those involved in cyber warfare activities, including policymakers, penetration testers, security professionals, network and systems administrators, and college instructors. The information provided on cyber tactics and attacks can also be used to assist in developing improved and more efficient procedures and technical defenses. Managers will find the text useful in improving the overall risk management strategies for their organizations. - Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks - Dives deeply into relevant technical and factual information from an insider's point of view - Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners;4
3;Copyright Page;5
4;Acknowledgments;6
5;Table of Contents;8
6;About the Authors;16
7;About the Technical Editor;18
8;Foreword;20
9;Introduction;24
10;Chapter1. What is Cyber Warfare?;30
10.1;What is Cyber Warfare?;30
10.2;Have We Seen a Cyber War?;41
10.3;Why Cyber Warfare is Important;44
10.4;Summary;45
10.5;Endnotes;46
11;Chapter2. The Cyberspace Battlefield;48
11.1;Boundaries in Cyber Warfare;48
11.2;Where Cyber Fits in the War-fighting Domains;55
11.3;Threatscape;58
11.4;Fielding Systems at the Speed of Need;63
11.5;Summary;64
11.6;Endnotes;65
12;Chapter3. Cyber Doctrine;66
12.1;Current U.S. Doctrine;66
12.2;Sample Doctrine/Strategy from Around the World;72
12.3;Translating Traditional Military Doctrine;75
12.4;Guidance and Directives;78
12.5;Operations and Exercises;83
12.6;Summary;86
12.7;Endnotes;86
13;Chapter4. Cyber Warriors;90
13.1;What Does a Cyber Warrior Look Like?;90
13.2;Differences from Traditional Forces;95
13.3;Present Cyber Warfare Forces;98
13.4;Staffing for Cyber War;105
13.5;Summary;109
13.6;Endnotes;109
14;Chapter5. Logical Weapons;112
14.1;Reconnaissance Tools;113
14.2;Scanning Tools;123
14.3;Access and Escalation Tools;129
14.4;Exfiltration Tools;135
14.5;Sustainment Tools;138
14.6;Assault Tools;139
14.7;Obfuscation Tools;142
14.8;Summary;146
14.9;Endnotes;147
15;Chapter6. Physical Weapons;148
15.1;How the Logical and Physical Realms are Connected;149
15.2;Infrastructure Concerns;151
15.3;Supply Chain Concerns;155
15.4;Tools for Physical Attack and Defense;157
15.5;Summary;165
15.6;Endnotes;166
16;Chapter7. Psychological Weapons;168
16.1;Social Engineering Explained;168
16.2;How the Military Approaches Social Engineering;174
16.3;How the Military Defends Against Social Engineering;178
16.4;Summary;181
16.5;Endnotes;181
17;Chapter8. Computer Network Exploitation;184
17.1;Intelligence and Counter-Intelligence;185
17.2;Reconnaissance;186
17.3;Surveillance;190
17.4;Summary;194
17.5;Endnotes;195
18;Chapter9. Computer Network Attack;196
18.1;Waging War in the Cyber Era;197
18.2;The Attack Process;199
18.3;Summary;207
18.4;Endnotes;207
19;Chapter10. Computer Network Defense;208
19.1;What We Protect;209
19.2;Security Awareness and Training;212
19.3;Defending against Cyber Attacks;214
19.4;Summary;219
19.5;Endnotes;220
20;Chapter11. Non-State Actors in Computer Network Operations;222
20.1;Individual Actors;223
20.2;Corporations;226
20.3;Cyber Terrorism;227
20.4;Organized Cyber Crime;230
20.5;Autonomous Actors;231
20.6;Summary;234
20.7;Endnotes;235
21;Chapter12. Legal System Impacts;236
21.1;Legal Systems;238
21.2;Key U.S. Laws;242
21.3;Privacy Impacts;247
21.4;Digital Forensics;248
21.5;Summary;251
21.6;Endnotes;251
22;Chapter13. Ethics;254
22.1;Ethics in Cyber Warfare;255
22.2;Bellum Iustum (Just War Theory);257
22.3;Summary;264
22.4;Endnotes;265
23;Chapter14. Cyberspace Challenges;268
23.1;Cybersecurity Issues Defined;269
23.2;Interrelationship of Cybersecurity Issues;281
23.3;Way Ahead;283
23.4;Summary;284
23.5;Endnotes;285
24;Chapter15. The Future of Cyber War;286
24.1;Near Term Trends;292
24.2;Most Likely and Most Dangerous Courses of Action;295
24.3;New Technologies and New problems;297
24.4;International Interactions;299
24.5;Summary;300
24.6;Endnotes;300
25;Appendix: Cyber Timeline;302
26;Index;306