We have also included an appendix with a timeline of the major events that have impacted or driven the conflicts in cyberspace.
Information in This Chapter
• How did We Get Here?
• Attack Methodology With the Tools and Techniques Used to Execute Them
• Attackers (Major Categories of Threats)
• Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)
• What the Threat is After (What We Should Focus on Defending)
How Did We Get Here?
In the early 1980s, when ARPANET was becoming the World Wide Web which grew into today’s Internet, the focus was on interoperability and reliability as a means of communication and potential command and control in the event of an emergency. Everyone with access ...