O'Reilly logo

Cyber Warfare, 2nd Edition by Steve Winterfeld, Jason Andress

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Note: Page numbers followed by b indicate boxes, f indicate figures and t indicate tables.

A

Academia and Industry associations, 77–78
AccessData Certified Examiner (ACE), 241–242
Active threats, 45–46
Act of war
cyberspace, 227
and use of force, 222
Advanced Persistent Threat (APT), 28, 175–176
Air Force approach, 167–168
Air Operation Center (AOC), 40–41
American Registry for Internet Numbers (ARIN), 107, 108
Army doctrine
documentation plan, 162
elicitation, 164
emotional approach, 164
false flag, 165
file/dossier, 164
general access attacks, 157–158
good/bad cop, 164
HUMINT collector, 162
integrated approaches, 163, 163f
targeted access attacks, 158–159
witness statements, 164
World War II, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required