An abstract design in the background, and the title of chapter 2 in the foreground. The design consists of alternating dark gray and pale gray regions. Chapter 2. Targets and Combatants. Copyright. Yurii Andreichyn. Shutterstock.

CHAPTER 2Targets and Combatants

© Yurii Andreichyn/Shutterstock.

THE HISTORY YOU LEARN IN SCHOOL is filled with stories of military victories and losses. When the word war is mentioned, people immediately conjure up images of armies marching off to fight. Over thousands of years of documented human warfare, people have become used to identifying a variety of traditionally accepted military targets. These include military bases, vehicles, groups of soldiers, and infrastructure that supports military operations. Many of the same targets exist in cyberwarfare. An enemy can attack strategically important military units, facilities, infrastructure, ...

Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.