October 2013
Intermediate to advanced
324 pages
12h 10m
English
We have also included an appendix with a timeline of the major events that have impacted or driven the conflicts in cyberspace.
• How did We Get Here?
• Attack Methodology With the Tools and Techniques Used to Execute Them
• Attackers (Major Categories of Threats)
• Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)
• What the Threat is After (What We Should Focus on Defending)
In the early 1980s, when ARPANET was becoming the World Wide Web which grew into today’s Internet, the focus was on interoperability and reliability as a means of communication and potential command and control in the event of an emergency. Everyone with access ...