Book description
Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations–operations in which it has become almost impossible to separate cyberwarfare from traditional warfare.
Table of contents
- Cover
- Title Page
- Copyright Page
- Contents
- Dedication Page
- Preface
- Acknowledgments
- About the Authors
- Chapter 1 Information as a Military Asset
- Chapter 2 Targets and Combatants
-
Chapter 3 Cyberwarfare, Law, and Ethics
- Kinetic Warfare
-
Cyberwarfare Law
- Cyberwarfare in a Kinetic Warfare Context
- Kinetic Warfare Law in a Cyber Context
- The Tallinn Manual
- Sovereignty, Jurisdiction, and Control
- Sovereignty
- Jurisdiction
- Control
- Responsibility
- Mercenaries
- The Use of Force
- Measuring Force
- Threats of Force
- Self-Defense
- International Governmental Organizations
- Civilians and Infrastructure
- Civilians and Military Use of the Internet
- Prohibited Targets: Children, Journalists, Medical and Religious Personnel, and Nature
- The Conduct of Attacks and Indiscriminate Means
- Espionage, Treachery, and Ruses
- Neutrality
- Ethics and Cyberwarfare
- Chapter Summary
- Key Concepts and Terms
- Chapter 3 Assessment
- Chapter 4 Intelligence Operations in a Connected World
- Chapter 5 The Evolving Threat: From Script Kiddies to Advanced Attackers
- Chapter 6 Social Engineering and Cyberwarfare
- Chapter 7 Weaponizing Cyberspace: A History
- Chapter 8 Nonstate Actors in Cyberwar
- Chapter 9 Defense-in-Depth Strategies
- Chapter 10 Cryptography and Cyberwar
- Chapter 11 Defending Endpoints
-
Chapter 12 Defending Networks
- Network Defense in Depth
- Identify, Protect, Detect, Respond, and Recover in the Context of Network Defense
- Mission Assurance
- Network Security Design
-
Network Defense Technologies
- Zero Trust
- Protocols
- Border Gateway Protocol
- Transport Layer Security
- IPsec
- Network Access Control
- Network Firewalls
- Routers and Switches
- Network Security Boundaries
- Virtual LANs
- Intrusion Detection and Prevention Systems
- Security Information and Event Management Systems
- Physical Network Protection
- Wireless Network Security
- Remote Access and Administration
- Active Defense
- Chapter Summary
- Key Concepts and Terms
- Chapter 12 Assessment
- Chapter 13 Defending Data
- Chapter 14 Cyberwarfare and Military Doctrine
-
Chapter 15 Pandora’s Box: The Future of Cyberwarfare
- The Future of Cyberwar
- Blurred Boundaries: Cyberwar and Nonstate Actors
- International Law and Cyberwarfare
- Networks Everywhere: Cyberwar in a Highly Connected World
- Cyberwar and Infrastructure
- Advanced Tools and Training
- The Future of Defensive Cyberwar
- Chapter Summary
- Key Concepts and Terms
- Chapter 15 Assessment
- Appendix A: Answer Key
- Appendix B: Standard Acronyms
- Glossary of Key Terms
- References
- Index
Product information
- Title: Cyberwarfare: Information Operations in a Connected World, 2nd Edition
- Author(s):
- Release date: October 2021
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9781284225457
You might also like
book
Foundations of Information Security
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics …
book
Fundamentals of Information Systems Security, 4th Edition
Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers …
book
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established …
book
Network Security Assessment, 3rd Edition
How secure is your network? The best way to find out is to attack it, using …