Skip to Main Content
Cyber Operations
book

Cyber Operations

by Jerry M. Couretas
April 2024
Intermediate to advanced content levelIntermediate to advanced
320 pages
8h 58m
English
Wiley
Content preview from Cyber Operations

Section IIICyberspace Environment and Tools Conclusion

Election machines and industrial control systems (ICS) use technologies, and supporting supply chains, that are vulnerable to cyber‐attack. IT gear suppliers, formerly commodity gadget makers, are now stakeholders in our collective security. In a recent example, Microsoft is playing a developing role in the cyber thread of the Ukraine war.

Being a twenty‐first‐century war, the Russian invasion of the Ukraine, while still relying on planes, tanks, and other kinetic weapons, now has a cyber element from beginning to end. Because of this cyber footprint, Microsoft is now a key observer and participant in the campaign, publishing a survey that includes key insights

The Russian invasion relies in part on a cyber strategy that includes at least three distinct and sometimes coordinated efforts – destructive cyberattacks within Ukraine, network penetration and espionage outside Ukraine, and cyber influence operations targeting people around the world.

(Smith, 2022)

As recently as the wars in Iraq and Afghanistan, strategic and tactical assessments were pretty exclusively products of think tanks (e.g., Institute for Defense Analysis (IDA), RAND, etc.); limited insight or input from traditional defense contractors. However, due to the scope and scale of cyber operations, operating system, and networking companies, “outsiders” with deep technical specialties, the folks who designed and developed this new domain of conflict, are ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Inside Cyber Warfare, 3rd Edition

Inside Cyber Warfare, 3rd Edition

Jeffrey Caruso
Cyber Threat Hunting

Cyber Threat Hunting

Nadhem AlFardan
Practical Cyber Intelligence

Practical Cyber Intelligence

Adam Tilmar Jakobsen

Publisher Resources

ISBN: 9781119712091Purchase Link