My Account Log in

1 option

Cyber warfare : techniques, tactics and tools for security practitioners / Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Andress, Jason.
Contributor:
Winterfeld, Steve.
Rogers, Russ.
Language:
English
Subjects (All):
Information warfare--Handbooks, manuals, etc.
Information warfare.
Computer networks--Security measures--Handbooks, manuals, etc.
Computer networks.
Physical Description:
1 online resource (321 p.)
Edition:
1st edition
Place of Publication:
Waltham, Mass. : Syngress, c2011.
System Details:
text file
Summary:
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the
Contents:
Front Cover; Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners; Copyright Page; Acknowledgments; Table of Contents; About the Authors; About the Technical Editor; Foreword; Introduction; Chapter1. What is Cyber Warfare?; What is Cyber Warfare?; Have We Seen a Cyber War?; Why Cyber Warfare is Important; Summary; Endnotes; Chapter2. The Cyberspace Battlefield; Boundaries in Cyber Warfare; Where Cyber Fits in the War-fighting Domains; Threatscape; Fielding Systems at the Speed of Need; Summary; Endnotes; Chapter3. Cyber Doctrine; Current U.S. Doctrine
Sample Doctrine/Strategy from Around the WorldTranslating Traditional Military Doctrine; Guidance and Directives; Operations and Exercises; Summary; Endnotes; Chapter4. Cyber Warriors; What Does a Cyber Warrior Look Like?; Differences from Traditional Forces; Present Cyber Warfare Forces; Staffing for Cyber War; Summary; Endnotes; Chapter5. Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Summary; Endnotes; Chapter6. Physical Weapons; How the Logical and Physical Realms are Connected
Infrastructure ConcernsSupply Chain Concerns; Tools for Physical Attack and Defense; Summary; Endnotes; Chapter7. Psychological Weapons; Social Engineering Explained; How the Military Approaches Social Engineering; How the Military Defends Against Social Engineering; Summary; Endnotes; Chapter8. Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Surveillance; Summary; Endnotes; Chapter9. Computer Network Attack; Waging War in the Cyber Era; The Attack Process; Summary; Endnotes; Chapter10. Computer Network Defense; What We Protect
Security Awareness and TrainingDefending against Cyber Attacks; Summary; Endnotes; Chapter11. Non-State Actors in Computer Network Operations; Individual Actors; Corporations; Cyber Terrorism; Organized Cyber Crime; Autonomous Actors; Summary; Endnotes; Chapter12. Legal System Impacts; Legal Systems; Key U.S. Laws; Privacy Impacts; Digital Forensics; Summary; Endnotes; Chapter13. Ethics; Ethics in Cyber Warfare; Bellum Iustum (Just War Theory); Summary; Endnotes; Chapter14. Cyberspace Challenges; Cybersecurity Issues Defined; Interrelationship of Cybersecurity Issues; Way Ahead; Summary
EndnotesChapter15. The Future of Cyber War; Near Term Trends; Most Likely and Most Dangerous Courses of Action; New Technologies and New problems; International Interactions; Summary; Endnotes; Appendix: Cyber Timeline; Index
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
ISBN:
9786613118783
9781283118781
1283118785
9781597496384
1597496383
OCLC:
751988775

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account