Book description
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.- Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play
- Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)
- Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec
- Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Preface
- Foreword
- Introduction
- Biography
- Chapter 1. Cyber Warfare: Here and Now
-
I: Cyber Attack
- Part I Cyber Attack
-
Chapter 2. Political Cyber Attack Comes of Age in 2007
- Information in this Chapter
- Reliance on Information as a Vulnerability
- Rudimentary but Effective: Denial of Service
- Leaving Unwanted Messages: Web Site Defacement
- Tools for Denial of Service
- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack
- Estonia Is Hit by Cyber Attacks
- General Response to DDoS
- Summary
- Suggested Further Reading
- References
- Chapter 3. How Cyber Attacks Augmented Russian Military Operations
- Chapter 4. When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East
- Chapter 5. Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia
-
Chapter 6. Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates
- Information in This Chapter
- “Chaotic” Beginnings: The Chaos Computer Club, CCC
- The Roots of the Anon—4chan, 7chan, and Other Message Boards
- How We Are Influenced by 4chan: Memes
- Anonymous—On Image, Structure, and Motivation
- Anonymous—External Connections and Spin Offs
- Your Security Is a Joke: LulzSec
- Anonymous’ Modus Operandi
- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous
- Software for the Legion: Anonymous Products
- Summary
- Suggested Further Reading
- References
-
II: Cyber Espionage and Exploitation
- Part II Cyber Espionage and Exploitation
-
Chapter 7. Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy
- Information in This Chapter
- Introduction
- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine
- Leveraging Resources Beyond the Military: The Cyber Warriors of China
- Stealing Information from the U.S. Industrial-Military Complex: Titan Rain
- Cyber War Against the Corporate World: A Case Study of Cyber Intrusion Attributed to China
- Monitoring Dissidents: Gh0stNet
- Using Legitimate Web Sites for Data Exfiltration: The Shadow Network
- Cyber War Through Intellectual Property Theft: Operation Aurora
- An Example of the Current State of the Art: Sykipot
- Summary
- Suggested Further Reading
- References
-
Chapter 8. Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation
- Information in This Chapter
- Introduction
- Kernel Mode Rootkits
- Vulnerabilities in the Operating System
- Stolen Keying Material
- Commonalities Between Stuxnet and Duqu
- Information-Stealing Trojans
- The Geography of Duqu
- TDL3 and Other Malware
- Object-Oriented Malware: Stuxnet, Duqu, Flame, and Gauss
- Summary
- Suggested Further Reading
- References
- Chapter 9. Losing Trust in Your Friends: Social Network Exploitation
- Chapter 10. How Iraqi Insurgents Watched U.S. Predator Video—Information Theft on the Tactical Battlefield
-
III: Cyber Operations for Infrastructure Attack
- Part III Cyber Operations for Infrastructure Attack
-
Chapter 11. Cyber Warfare Against Industry
- Information in This Chapter
- Introduction
- Industrial Control Systems: Critical Infrastructure for Modern Nations
- Information Technology vs. Industrial Control Systems: Why Traditional Infosec Practices May Not Apply
- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology
- How a Cyber Attack Led to Water Contamination: The Maroochy Water Breach
- Summary
- Suggested Further Reading
- References
- Chapter 12. Can Cyber Warfare Leave a Nation in the Dark? Cyber Attacks Against Electrical Infrastructure
-
Chapter 13. Attacking Iranian Nuclear Facilities: Stuxnet
- Information in This Chapter
- Introduction
- The Alleged Target: The Natanz Fuel Enrichment Facility
- How Stuxnet Targets Industrial Control Systems
- Stuxnet Successfully Targets the Natanz Fuel Enrichment Plant
- Stuxnet Is a Significant Advancement in Malware
- Stuxnet Invalidates Several Security Assumptions
- Implications for the Future
- Summary
- Suggested Further Reading
- References
- Conclusion and the Future of Cyber Warfare
- Appendix I. Chapter 6: LulzSec Hacktivities
- Appendix II. Chapter 6: Anonymous Timeline
- Glossary
- Index
Product information
- Title: Introduction to Cyber-Warfare
- Author(s):
- Release date: May 2013
- Publisher(s): Syngress
- ISBN: 9780124079267
You might also like
book
Hands-On Dark Web Analysis
Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features …
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Zscaler Cloud Security Essentials
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a …