O'Reilly logo

The Basics of Cyber Warfare by Jason Andress, Steve Winterfeld

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1

Cyber Threatscape

Information in this chapter:

• How Did We Get Here?

• Attack Methodology Plus Tools/Techniques Used

• Attackers (The Types of Threats)

• How Most Organizations Defend Today (Defensive Mountain Range)?

• Targeted Capabilities (What We should be Defending)

How Did We Get Here?

In the early 1980s, when ARPANET was becoming the World Wide Web which grew into today’s Internet, the focus was on interoperability and reliability as a means of communication and potential command and control in the event of an emergency. Everyone with access to the system knew each other and security was not a consideration. Then, in the late 1980s, trouble started; Robert Morris released the first worm (a self-replicating piece of malware) ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required