Chapter 1
Cyber Threatscape
Information in this chapter:
• How Did We Get Here?
• Attack Methodology Plus Tools/Techniques Used
• Attackers (The Types of Threats)
• How Most Organizations Defend Today (Defensive Mountain Range)?
• Targeted Capabilities (What We should be Defending)
How Did We Get Here?
In the early 1980s, when ARPANET was becoming the World Wide Web which grew into today’s Internet, the focus was on interoperability and reliability as a means of communication and potential command and control in the event of an emergency. Everyone with access to the system knew each other and security was not a consideration. Then, in the late 1980s, trouble started; Robert Morris released the first worm (a self-replicating piece of malware) ...
Get The Basics of Cyber Warfare now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.