Cyber Warfare - Truth, Tactics, and Strategies

Book description

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.

Key Features

  • Define and determine a cyber-defence strategy based on current and past real-life examples
  • Understand how future technologies will impact cyber warfare campaigns and society
  • Future-ready yourself and your business against any cyber threat

Book Description

The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media.

Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light.

The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario.

Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data.

What you will learn

  • Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield
  • Defending a boundaryless enterprise
  • Using video and audio as weapons of influence
  • Uncovering DeepFakes and their associated attack vectors
  • Using voice augmentation for exploitation
  • Defending when there is no perimeter
  • Responding tactically to counter-campaign-based attacks

Who this book is for

This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Table of contents

  1. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
      1. Download the color images
      2. Conventions used
    4. Get in touch
      1. Reviews
  2. A Brief History of Cyber Threats and the Emergence of the APT Designator
    1. Hackers aren't what Hollywood shows us
    2. The Battle of the Beams
    3. Modem hacks
    4. Anti-virus growth
    5. The dawn of Advanced Persistent Threats (APTs)
    6. Early APT attacks
    7. Confusion in cyber defense
    8. US and allied cyber defense establishment
    9. The cyber shot heard round the world
    10. Tit-for-Tat cyber warfare
    11. Pandora's box busts open
    12. Conclusion
    13. References
  3. The Perimeter Is Dead
    1. A scenario detailing holes in the model
    2. A global perimeter falls
    3. Even compliant organizations' perimeters fail
    4. Governments' perimeters fail
    5. Users, BYOD, and the obliteration of the perimeter
    6. Applications add to insecurity
    7. Authentication methods failed
    8. IoT devices poke holes in any perimeter
    9. You can't fix stupid, or evil
    10. Conclusion
    11. References
  4. Emerging Tactics and Trends – What Is Coming?
    1. Attacks move downstream
    2. Autonomous vehicles…Bad data, bad day
    3. Drones…Death from above
    4. Threat actors combine tactics to optimize attack effectiveness
    5. Ransomware goes mobile
    6. DDoS reaches weapons-grade refinement
    7. Conclusion
    8. References
  5. Influence Attacks – Using Social Media Platforms for Malicious Purposes
    1. The new cyber onslaught
    2. Cyber combat is changing
    3. #Hashtag or ammunition?
    4. Influencing the influencers
    5. Conclusion
    6. References
  6. DeepFakes and AI/ML in Cyber Security
    1. From big screen to smartphone – the dawn of DeepFakes
    2. Defining DeepFakes
    3. GANs power DeepFakes
    4. Applied DeepFakes, AKA DeepMastersPrints
    5. Hacking voice using ML, AKA DeepVoice
    6. ReadFakes
    7. Breaking news may mean breaking bad
    8. When data and AI "studies" go awry
    9. Conclusion
    10. References
  7. Advanced Campaigns in Cyber Warfare
    1. Cyber warfare campaigns
      1. Indian Nuclear Plant campaign
      2. Chinese manufacturing campaign
      3. The US and Libya election interference campaign
    2. False flags corrupt campaign attribution in cyberspace
      1. Mapping campaigns to matrices
      2. Threat groups avoid attribution intentionally
        1. Modifying command and control for confusion
        2. Naming the beast
        3. Sometimes it doesn't add up
        4. Chaos is the goal
    3. Cyber attack campaigns for the coming decade
      1. Hoaxing
    4. Conclusion
  8. Strategic Planning for Future Cyber Warfare
    1. Everyone has a plan until they get punched in the mouth
    2. What type of strategy?
    3. When the nature of combat demands a change in strategy
      1. Infiltration does not equal dominance
      2. Leaders need to have their "boots on the ground"
      3. The environment determines what works, not the equipment
      4. Intelligence and "Intel" may not be the same thing
      5. Too much may be too much
      6. Big walls can mean big problems
      7. The mission was not accomplished…
    4. What does an effective strategy in cyberspace look like?
      1. Changing strategic concepts
      2. Strategically defending the "Edge"
      3. Eat the elephant
      4. The orchestration enables the strategy
    5. Conclusion
  9. Cyber Warfare Strategic Innovations and Force Multipliers
    1. Defensive tooling and strategic enablers
      1. Meet the Monkey
      2. More offerings from the Infection Monkey
      3. Advanced uses of the Infection Monkey
      4. The Software-Defined Perimeter
      5. Application whitelisting
    2. Offensive tooling and strategic enablers
      1. Why kill the password?
      2. WhatBreach
      3. SNAP_R
        1. Running the SNAP_R attack (sample commands)
      4. Comment faking for influence
    3. Conclusion
    4. References
  10. Bracing for Impact
    1. Disclaimer
    2. Micro-segmentation is a key to survival
      1. What is micro-segmentation?
      2. Micro-segmentation tools and technologies
    3. A pragmatic application for SDN
      1. Possible pitfalls in micro-segmentation
      2. Reclaiming the "high ground"
    4. Kill the password, limit the pain
      1. Intelligence collection
    5. Conclusion
    6. References
  11. Survivability in Cyber Warfare and Potential Impacts for Failure
    1. What good are laws in war?
    2. "Law 1" – Default means dead
    3. "Law 2" – Think strategically, move tactically
    4. "Law 3" – Details, details
    5. "Law 4" – Kill the password
    6. "Law 5" – Limit the blast radius
    7. Impact from failure
      1. Compromising healthcare
      2. Bringing down ICS (Industrial Control Systems)
      3. Threatening the fates of nations
        1. Threat scenario – DeepFakes
        2. Threat scenario – Data manipulation
        3. Threat scenario – Attacking democratic processes
    8. Conclusion
  12. Appendix – Major Cyber Incidents Throughout 2019
  13. Other Books You May Enjoy
  14. Index

Product information

  • Title: Cyber Warfare - Truth, Tactics, and Strategies
  • Author(s): Dr. Chase Cunningham, Gregory J. Touhill
  • Release date: February 2020
  • Publisher(s): Packt Publishing
  • ISBN: 9781839216992