O'Reilly logo

Cyber Warfare, 2nd Edition by Steve Winterfeld, Jason Andress

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Cyber Threatscape

Abstract

We have also included an appendix with a timeline of the major events that have impacted or driven the conflicts in cyberspace.

Information in This Chapter

• How did We Get Here?

• Attack Methodology With the Tools and Techniques Used to Execute Them

• Attackers (Major Categories of Threats)

• Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)

• What the Threat is After (What We Should Focus on Defending)

How Did We Get Here?

In the early 1980s, when ARPANET was becoming the World Wide Web which grew into today’s Internet, the focus was on interoperability and reliability as a means of communication and potential command and control in the event of an emergency. Everyone with access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required