Text
The basics of cyber warfare: understanding the fundamentals of cyber warfare in theory and practice
Table of Contents
Chapter 1. Cyber Threatscape
How Did We Get Here?
Attack Methodology Plus Tools/Techniques Used
Attackers (The Types of Threats)
How Most Organizations Defend Today (Defensive Mountain Range)?
Targeted Capabilities (What We Should be Defending)
Summary
References
Chapter 2. Cyberspace Battlefield Operations
What is Cyber Warfare?
Cyber War—Hype or Reality
Boundaries in Cyber Warfare
Where Cyber Fits in the War-Fighting Domains
Summary
References
Chapter 3. Cyber Doctrine
Current US Doctrine
Sample Doctrine / Strategy From Around the World
Some Key Military Principles that Must be Adapted to Cyber Warfare
Summary
References
Chapter 4. Tools and Techniques
Logical Weapons
hysical Weapons
Summary
References
Chapter 5. Offensive Tactics and Procedures
Computer Network Exploitation
Computer Network Attack
Summary
References
Chapter 6. Psychological Weapons
Social Engineering Explained
How the Military Approaches Social Engineering
How the Military Defends against Social Engineering
Summary
References
Chapter 7. Defensive Tactics and Procedures
What We Protect
Security Awareness and Training
Defending Against Cyber Attacks
Summary
References
Chapter 8. Challenges We Face
Cybersecurity Issues defined
Interrelationship of Cybersecurity Issues
Way Ahead
Summary
References
Chapter 9. Where is Cyber Warfare Headed?
Technology-Based Trends
Policy-Based Trends
How to Defend in Today’s Contested Virtual Environment
Summary
References
Index
No other version available