Chapter 1

Cyber Threatscape

Information in this chapter:

• How Did We Get Here?

• Attack Methodology Plus Tools/Techniques Used

• Attackers (The Types of Threats)

• How Most Organizations Defend Today (Defensive Mountain Range)?

• Targeted Capabilities (What We should be Defending)

How Did We Get Here?

In the early 1980s, when ARPANET was becoming the World Wide Web which grew into today’s Internet, the focus was on interoperability and reliability as a means of communication and potential command and control in the event of an emergency. Everyone with access to the system knew each other and security was not a consideration. Then, in the late 1980s, trouble started; Robert Morris released the first worm (a self-replicating piece of malware) ...

Get The Basics of Cyber Warfare now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.