Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners


Jason. Andress
Bok Engelsk 2011 · Electronic books.
Utgitt
Burlington : : Elsevier Science, , 2011.
Omfang
1 online resource (321 p.)
Opplysninger
Description based upon print version of record.. - Front Cover; Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners; Copyright Page; Acknowledgments; Table of Contents; About the Authors; About the Technical Editor; Foreword; Introduction; Chapter1. What is Cyber Warfare?; What is Cyber Warfare?; Have We Seen a Cyber War?; Why Cyber Warfare is Important; Summary; Endnotes; Chapter2. The Cyberspace Battlefield; Boundaries in Cyber Warfare; Where Cyber Fits in the War-fighting Domains; Threatscape; Fielding Systems at the Speed of Need; Summary; Endnotes; Chapter3. Cyber Doctrine; Current U.S. Doctrine. - EndnotesChapter15. The Future of Cyber War; Near Term Trends; Most Likely and Most Dangerous Courses of Action; New Technologies and New problems; International Interactions; Summary; Endnotes; Appendix: Cyber Timeline; Index. - Infrastructure ConcernsSupply Chain Concerns; Tools for Physical Attack and Defense; Summary; Endnotes; Chapter7. Psychological Weapons; Social Engineering Explained; How the Military Approaches Social Engineering; How the Military Defends Against Social Engineering; Summary; Endnotes; Chapter8. Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Surveillance; Summary; Endnotes; Chapter9. Computer Network Attack; Waging War in the Cyber Era; The Attack Process; Summary; Endnotes; Chapter10. Computer Network Defense; What We Protect. - Sample Doctrine/Strategy from Around the WorldTranslating Traditional Military Doctrine; Guidance and Directives; Operations and Exercises; Summary; Endnotes; Chapter4. Cyber Warriors; What Does a Cyber Warrior Look Like?; Differences from Traditional Forces; Present Cyber Warfare Forces; Staffing for Cyber War; Summary; Endnotes; Chapter5. Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Summary; Endnotes; Chapter6. Physical Weapons; How the Logical and Physical Realms are Connected. - Security Awareness and TrainingDefending against Cyber Attacks; Summary; Endnotes; Chapter11. Non-State Actors in Computer Network Operations; Individual Actors; Corporations; Cyber Terrorism; Organized Cyber Crime; Autonomous Actors; Summary; Endnotes; Chapter12. Legal System Impacts; Legal Systems; Key U.S. Laws; Privacy Impacts; Digital Forensics; Summary; Endnotes; Chapter13. Ethics; Ethics in Cyber Warfare; Bellum Iustum (Just War Theory); Summary; Endnotes; Chapter14. Cyberspace Challenges; Cybersecurity Issues Defined; Interrelationship of Cybersecurity Issues; Way Ahead; Summary. - Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the
Emner
Sjanger
Dewey
ISBN
9781597496377

Andre utgaver/formater

Cyber warfare : techniques, tactics and tools for security practitioners
Jason Andress, Steve Winterfeld ; Lillian...

Bok · Engelsk · 2014

Bibliotek som har denne