Book description
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.
This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.
This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
- Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
- Dives deeply into relevant technical and factual information from an insider's point of view
- Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Acknowledgments
- Foreword
- Introduction
- Chapter 1. What is Cyber Warfare?
-
Chapter 2. Cyber Threatscape
- Abstract
- Information in This Chapter
- How Did We Get Here?
- Attack Methodology with the Tools and Techniques Used to Execute Them
- Attackers (Major Categories of Threats)
- Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)
- What the Threat Is After (What We Should Focus on Defending)
- Summary
- References
- Chapter 3. The Cyberspace Battlefield
- Chapter 4. Cyber Doctrine
- Chapter 5. Cyber Warriors
- Chapter 6. Logical Weapons
- Chapter 7. Physical Weapons
- Chapter 8. Psychological Weapons
- Chapter 9. Computer Network Exploitation
- Chapter 10. Computer Network Attack
- Chapter 11. Computer Network Defense
- Chapter 12. Non-State Actors in Computer Network Operations
- Chapter 13. Legal System Impacts
- Chapter 14. Ethics
- Chapter 15. Cyberspace Challenges
- Chapter 16. The Future of Cyber War
- Appendix
- Index
Product information
- Title: Cyber Warfare, 2nd Edition
- Author(s):
- Release date: October 2013
- Publisher(s): Syngress
- ISBN: 9780124166332
You might also like
book
Inside Cyber Warfare, 2nd Edition
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a …
book
Cyber Warfare
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and …
book
The Basics of Cyber Warfare
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical …
book
Cyber Threat Intelligence
CYBER THREAT INTELLIGENCE "Martin takes a thorough and focused approach to the processes that rule threat …