O'Reilly logo

Cyber Warfare, 2nd Edition by Steve Winterfeld, Jason Andress

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Computer Network Exploitation

Abstract

Computer Network Exploitation refers to the ability to exploit data or information a person has gathered on a target for his or her own purposes, and it is the phase of cyber warfare being experienced globally today. This chapter discusses Computer Network Exploitation basics and begins by explaining how to identify targets by gleaning information from them and identifying those to be surveilled. Potential sources for attacks, along with agencies that might be behind attacks, are highlighted. Also discussed is the issue of reconnaissance—how to use it to conduct planning operations for future attacks, and the differences between the three reconnaissance types known as Open Source Intelligence, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required