Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent The Basics of Cyber Warfare [ISBN: 9780124047372] for the semester, quarter, and short term or search our site for other textbooks by Winterfeld, Steve; Andress, Jason. Renting a textbook can save you up to 90% from the cost of buying.
Dedication | p. v |
Author Biography | p. xi |
Cyber Threatscape | p. 1 |
How Did We Get Here? | p. 1 |
Attack Methodology Plus Tools/Techniques Used | p. 3 |
Attackers (The Types of Threats) | p. 8 |
How Most Organizations Defend Today (Defensive Mountain Range)? | p. 10 |
Targeted Capabilities (What We Should be Defending) | p. 13 |
Summary | p. 14 |
Cyberspace Battlefield Operations | p. 15 |
What is Cyber Warfare? | p. 15 |
Definition for Cyber Warfare | p. 16 |
Tactical and Operational Reasons for Cyber War | p. 17 |
Cyber Strategy and Power | p. 19 |
Cyber Arms Control | p. 21 |
Cyber War-Hype or Reality | p. 21 |
Boundaries in Cyber Warfare | p. 22 |
Defense in Depth | p. 22 |
Computer Controlled Infrastructure | p. 23 |
Organizational View | p. 23 |
Where Cyber Fits in the War-Fighting Domains | p. 25 |
Land | p. 26 |
Sea | p. 26 |
Air | p. 27 |
Space | p. 27 |
Cyber Domain | p. 27 |
Summary | p. 28 |
Cyber Doctrine | p. 31 |
Current US Doctrine | p. 31 |
US Forces | p. 33 |
US Air Force | p. 35 |
US Navy | p. 36 |
US Army | p. 36 |
DoD INFOCONs | p. 38 |
Sample Doctrine / Strategy From Around the World | p. 39 |
Chinese Doctrine | p. 39 |
Other Asian countries | p. 42 |
European Countries | p. 43 |
Private or Mercenary Armies | p. 44 |
Some Key Military Principles that Must be Adapted to Cyber Warfare | p. 45 |
Intelligence Preparation of the Operational Environment (TPOE) | p. 45 |
Joint Munitions Effectiveness Manual (JMEM) | p. 45 |
Measures of Effectiveness (MOE) | p. 46 |
Battle Damage Assessment (BDA) | p. 47 |
Close Air Support (CAS) | p. 47 |
Counterinsurgency (COIN) | p. 47 |
Summary | p. 48 |
Tools and Techniques | p. 51 |
Logical Weapons | p. 51 |
Reconnaissance Tools | p. 52 |
Scanning Tools | p. 52 |
Access and Escalation Tools | p. 52 |
Exfiltration Tools | p. 53 |
Sustainment Tools | p. 53 |
Assault Tools | p. 53 |
Obfuscation Tools | p. 54 |
Physical Weapons | p. 54 |
How the Logical and Physical Realms are Connected | p. 55 |
Infrastructure Concerns | p. 57 |
Supply Chain Concerns | p. 60 |
Tools for Physical Attack and Defense | p. 62 |
Summary | p. 64 |
Offensive Tactics and Procedures | p. 67 |
Computer Network Exploitation | p. 67 |
Intelligence and Counter-Intelligence | p. 67 |
Reconnaissance | p. 68 |
Surveillance | p. 70 |
Computer Network Attack | p. 73 |
Waging War in the Cyber Era | p. 73 |
The Attack Process | p. 75 |
Summary | p. 81 |
Psychological Weapons | p. 83 |
Social Engineering Explained | p. 83 |
Is Social Engineering science? | p. 84 |
SE Tactics Techniques and Procedures (TTPs) | p. 84 |
Types of SE approaches | p. 86 |
Types of SE methodologies | p. 88 |
How the Military Approaches Social Engineering | p. 89 |
Army Doctrine | p. 89 |
How the Military Defends against Social Engineering | p. 92 |
How the Army Does CI | p. 95 |
An Air Force Approach | p. 95 |
Summary | p. 96 |
Defensive Tactics and Procedures | p. 99 |
What We Protect | p. 100 |
Confidentiality, Integrity, Availability (CIA) | p. 101 |
Authenticate, Authorize, and Audit | p. 102 |
Security Awareness and Training | p. 104 |
Awareness | p. 104 |
Training | p. 106 |
Defending Against Cyber Attacks | p. 106 |
Policy and Compliance | p. 107 |
Surveillance, Data Mining, and Pattern Matching | p. 107 |
Intrusion Detection and Prevention | p. 108 |
Vulnerability Assessment and Penetration Testing | p. 109 |
Disaster Recovery Planning | p. 109 |
Defense in Depth | p. 110 |
Summary | p. 111 |
Challenges We Face | p. 113 |
Cybersecurity Issues Defined | p. 114 |
Policy | p. 115 |
Processes | p. 116 |
Technical | p. 117 |
Skills | p. 120 |
People | p. 121 |
Organization | p. 122 |
Core (Impacting All Areas) | p. 123 |
Interrelationship of Cybersecurity Issues | p. 126 |
Way Ahead | p. 127 |
Summary | p. 129 |
Where is Cyber Warfare Headed? | p. 131 |
Technology-Based Trends | p. 133 |
Policy-Based Trends | p. 136 |
How to Defend in Today's Contested Virtual Environment | p. 139 |
Summary | p. 140 |
Index | p. 145 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.