The Basics of Cyber Warfare

by ;
  • ISBN13:


  • ISBN10:


  • Format: Paperback
  • Copyright: 2012-11-16
  • Publisher: Syngress Media Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.95 Save up to $7.49
  • Buy Used


Supplemental Materials

What is included with this book?


As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The Basics of Cyber Warfare teaches readers the principles of cyber warfare, including military doctrine, cyber doctrine, and both offensive and defensive tactics and procedures. Readers learn the basics of how to defend against: . Espionage . Hactivism . Insider threats . State-sponsored attacks . Non-state actors such as organized criminals and terrorists The Basics of Cyber Warfare gives readers a concise overview of these threats, and outlines the ethics, laws and consequences of cyber war. This book is designed as an introductory book to give readers insight into the concepts and techniques of cyber warfare. The authors' other title, Cyber Warfare, published by Syngress in 2011, will be mentioned in the Introduction of this book for readers who are interested in diving in to these topics and techniques in more depth. . Provides a sound understanding of the tools and tactics used in cyber warfare. . Describes both offensive and defensive tactics from an insider's point of view. . Presents doctrine and hands-on techniques you need to understand as cyber warfare evolves with technology.

Author Biography

Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong background in Cybersecurity, Military Intelligence, Certification Accreditation (CA), Simulations and Project Management. Jason Andress (ISSAP, CISSP, GPEN, CISM) is a seasoned security professional with a depth of experience in both the academic and business worlds.

Table of Contents

Dedicationp. v
Author Biographyp. xi
Cyber Threatscapep. 1
How Did We Get Here?p. 1
Attack Methodology Plus Tools/Techniques Usedp. 3
Attackers (The Types of Threats)p. 8
How Most Organizations Defend Today (Defensive Mountain Range)?p. 10
Targeted Capabilities (What We Should be Defending)p. 13
Summaryp. 14
Cyberspace Battlefield Operationsp. 15
What is Cyber Warfare?p. 15
Definition for Cyber Warfarep. 16
Tactical and Operational Reasons for Cyber Warp. 17
Cyber Strategy and Powerp. 19
Cyber Arms Controlp. 21
Cyber War-Hype or Realityp. 21
Boundaries in Cyber Warfarep. 22
Defense in Depthp. 22
Computer Controlled Infrastructurep. 23
Organizational Viewp. 23
Where Cyber Fits in the War-Fighting Domainsp. 25
Landp. 26
Seap. 26
Airp. 27
Spacep. 27
Cyber Domainp. 27
Summaryp. 28
Cyber Doctrinep. 31
Current US Doctrinep. 31
US Forcesp. 33
US Air Forcep. 35
US Navyp. 36
US Armyp. 36
Sample Doctrine / Strategy From Around the Worldp. 39
Chinese Doctrinep. 39
Other Asian countriesp. 42
European Countriesp. 43
Private or Mercenary Armiesp. 44
Some Key Military Principles that Must be Adapted to Cyber Warfarep. 45
Intelligence Preparation of the Operational Environment (TPOE)p. 45
Joint Munitions Effectiveness Manual (JMEM)p. 45
Measures of Effectiveness (MOE)p. 46
Battle Damage Assessment (BDA)p. 47
Close Air Support (CAS)p. 47
Counterinsurgency (COIN)p. 47
Summaryp. 48
Tools and Techniquesp. 51
Logical Weaponsp. 51
Reconnaissance Toolsp. 52
Scanning Toolsp. 52
Access and Escalation Toolsp. 52
Exfiltration Toolsp. 53
Sustainment Toolsp. 53
Assault Toolsp. 53
Obfuscation Toolsp. 54
Physical Weaponsp. 54
How the Logical and Physical Realms are Connectedp. 55
Infrastructure Concernsp. 57
Supply Chain Concernsp. 60
Tools for Physical Attack and Defensep. 62
Summaryp. 64
Offensive Tactics and Proceduresp. 67
Computer Network Exploitationp. 67
Intelligence and Counter-Intelligencep. 67
Reconnaissancep. 68
Surveillancep. 70
Computer Network Attackp. 73
Waging War in the Cyber Erap. 73
The Attack Processp. 75
Summaryp. 81
Psychological Weaponsp. 83
Social Engineering Explainedp. 83
Is Social Engineering science?p. 84
SE Tactics Techniques and Procedures (TTPs)p. 84
Types of SE approachesp. 86
Types of SE methodologiesp. 88
How the Military Approaches Social Engineeringp. 89
Army Doctrinep. 89
How the Military Defends against Social Engineeringp. 92
How the Army Does CIp. 95
An Air Force Approachp. 95
Summaryp. 96
Defensive Tactics and Proceduresp. 99
What We Protectp. 100
Confidentiality, Integrity, Availability (CIA)p. 101
Authenticate, Authorize, and Auditp. 102
Security Awareness and Trainingp. 104
Awarenessp. 104
Trainingp. 106
Defending Against Cyber Attacksp. 106
Policy and Compliancep. 107
Surveillance, Data Mining, and Pattern Matchingp. 107
Intrusion Detection and Preventionp. 108
Vulnerability Assessment and Penetration Testingp. 109
Disaster Recovery Planningp. 109
Defense in Depthp. 110
Summaryp. 111
Challenges We Facep. 113
Cybersecurity Issues Definedp. 114
Policyp. 115
Processesp. 116
Technicalp. 117
Skillsp. 120
Peoplep. 121
Organizationp. 122
Core (Impacting All Areas)p. 123
Interrelationship of Cybersecurity Issuesp. 126
Way Aheadp. 127
Summaryp. 129
Where is Cyber Warfare Headed?p. 131
Technology-Based Trendsp. 133
Policy-Based Trendsp. 136
How to Defend in Today's Contested Virtual Environmentp. 139
Summaryp. 140
Indexp. 145
Table of Contents provided by Ingram. All Rights Reserved.

Rewards Program

Write a Review