Skip to:Content
|
Bottom
Cover image for Cyber warfare : techniques, tactics and tools for security practitioners
Title:
Cyber warfare : techniques, tactics and tools for security practitioners
Personal Author:
Publication Information:
Burlington, MA : Elsevier/Syngress, c2011
Physical Description:
xxvii, 289 p. : ill. ; 24 cm.
ISBN:
9781597496377

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010257931 U163 A53 2011 Open Access Book Book
Searching...
Searching...
30000010257932 U163 A53 2011 Open Access Book Book
Searching...

On Order

Summary

Summary

Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The concepts discussed will give students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It considers relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Starting with a definition of cyber warfare, the book's 15 chapters discuss the following topics: the cyberspace battlefield; cyber doctrine; cyber warriors; logical, physical, and psychological weapons; computer network exploitation; computer network attack and defense; non-state actors in computer network operations; legal system impacts; ethics in cyber warfare; cyberspace challenges; and the future of cyber war.

This book is a valuable resource to those involved in cyber warfare activities, including policymakers, penetration testers, security professionals, network and systems administrators, and college instructors. The information provided on cyber tactics and attacks can also be used to assist in developing improved and more efficient procedures and technical defenses. Managers will find the text useful in improving the overall risk management strategies for their organizations.


Author Notes

Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.


Table of Contents

Foreword Introduction
Chapter 1 What is Cyber Warfare?
Chapter 2 The Cyberspace Battlefield
Chapter 3 Cyber Doctrine
Chapter 4 Cyber Warriors
Chapter 5 Logical Weapons
Chapter 6 Physical Weapons
Chapter 7 Psychological Weapons
Chapter 8 Computer Network Exploitation
Chapter 9 Computer Network Attack
Chapter 10 Computer Network Defense
Chapter 11 Non-State Actors in Computer Network Operations
Chapter 12 Legal System Impacts
Chapter 13 Ethics
Chapter 14 Cyberspace Challenges
Chapter 15 The Future of Cyber War
Appendix: Cyber Timeline
Go to:Top of Page