Book description
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The concepts discussed will give students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.
Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It considers relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Starting with a definition of cyber warfare, the book’s 15 chapters discuss the following topics: the cyberspace battlefield; cyber doctrine; cyber warriors; logical, physical, and psychological weapons; computer network exploitation; computer network attack and defense; non-state actors in computer network operations; legal system impacts; ethics in cyber warfare; cyberspace challenges; and the future of cyber war.
This book is a valuable resource to those involved in cyber warfare activities, including policymakers, penetration testers, security professionals, network and systems administrators, and college instructors. The information provided on cyber tactics and attacks can also be used to assist in developing improved and more efficient procedures and technical defenses. Managers will find the text useful in improving the overall risk management strategies for their organizations.
- Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
- Dives deeply into relevant technical and factual information from an insider's point of view
- Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
Table of contents
- Cover image
- Table of Contents
- Front Matter
- Copyright
- Acknowledgments
- About the Authors
- About the Technical Editor
- Foreword
- Introduction
- Chapter 1. What is Cyber Warfare?
- Chapter 2. The Cyberspace Battlefield
- Chapter 3. Cyber Doctrine
- Chapter 4. Cyber Warriors
- Chapter 5. Logical Weapons
- Chapter 6. Physical Weapons
- Chapter 7. Psychological Weapons
- Chapter 8. Computer Network Exploitation
- Chapter 9. Computer Network Attack
- Chapter 10. Computer Network Defense
- Chapter 11. Non-State Actors in Computer Network Operations
- Chapter 12. Legal System Impacts
- Chapter 13. Ethics
- Chapter 14. Cyberspace Challenges
- Chapter 15. The Future of Cyber War
- Appendix: Cyber Timeline
- Index
Product information
- Title: Cyber Warfare
- Author(s):
- Release date: July 2011
- Publisher(s): Syngress
- ISBN: 9781597496384
You might also like
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
video
Full Stack Web Development Mastery Course - Novice to Expert
Full stack development refers to the development of both frontend (client-side) and backend (server-side) portions of …
book
The Cyber Risk Handbook
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide …
video
Introduction to ChatGPT and OpenAI
OpenAI ChatGPT is a powerful language model that uses advanced ML techniques to generate human-like text …