© Mike O'Leary 2019
Mike O'LearyCyber Operationshttps://doi.org/10.1007/978-1-4842-4294-0_1

1. System Setup

Mike O’Leary1 
(1)
Towson, MD, USA
 

Introduction

Cyber operations is about the configuration, defense, and attack of real systems. This text focuses on systems that were deployed between 2011 and 2017.

To configure, attack, and defend systems, a testing laboratory is required. Such a laboratory must not only allow systems to be built and run but must provide a way to segregate them from the wider Internet; after all, older systems are known to be vulnerable to public exploits. One excellent solution is virtualization. A range of virtualization solutions exists; two commonly deployed solutions are VMWare and VirtualBox. This chapter begins with ...

Get Cyber Operations: Building, Defending, and Attacking Modern Computer Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.