Chapter 2

Cyber Threatscape


We have also included an appendix with a timeline of the major events that have impacted or driven the conflicts in cyberspace.

Information in This Chapter

• How did We Get Here?

• Attack Methodology With the Tools and Techniques Used to Execute Them

• Attackers (Major Categories of Threats)

• Defense in Depth—How Organizations Defend Today (Defensive Mountain Range)

• What the Threat is After (What We Should Focus on Defending)

How Did We Get Here?

In the early 1980s, when ARPANET was becoming the World Wide Web which grew into today’s Internet, the focus was on interoperability and reliability as a means of communication and potential command and control in the event of an emergency. Everyone with access ...

Get Cyber Warfare, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.