LEADER 05583nam 2200697Ia 450 001 9910462134603321 005 20200520144314.0 010 $a1-283-81084-0 010 $a0-12-405181-2 035 $a(CKB)2670000000274588 035 $a(EBL)1073026 035 $a(OCoLC)819634806 035 $a(SSID)ssj0000782706 035 $a(PQKBManifestationID)11441236 035 $a(PQKBTitleCode)TC0000782706 035 $a(PQKBWorkID)10748218 035 $a(PQKB)10159745 035 $a(MiAaPQ)EBC1073026 035 $a(CaSebORM)9780124047372 035 $a(Au-PeEL)EBL1073026 035 $a(CaPaEBR)ebr10626273 035 $a(CaONFJC)MIL412334 035 $a(EXLCZ)992670000000274588 100 $a20121129d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe basics of cyber warfare$b[electronic resource] $eunderstanding the fundamentals of cyber warfare in theory and practice /$fSteve Winterfield, Jason Andress 205 $a1st edition 210 $aBoston $cSyngress$dc2013 215 $a1 online resource (169 p.) 225 0 $aSyngress basics series The basics of cyber warfare 300 $aDescription based upon print version of record. 311 $a0-12-404737-8 320 $aIncludes bibliographical references and index. 327 $aHalf Title; Title page; Copyright; Dedication; Contents; Author Biography; Introduction; 1 Cyber Threatscape; How Did We Get Here?; Attack Methodology Plus Tools/Techniques Used; Attackers (The Types of Threats); How Most Organizations Defend Today (Defensive Mountain Range)?; Targeted Capabilities (What We Should be Defending); Summary; References; 2 Cyberspace Battlefield Operations; What is Cyber Warfare?; Definition for Cyber Warfare; Tactical and Operational Reasons for Cyber War; Cyber Strategy and Power; Cyber Arms Control; Cyber War-Hype or Reality; Boundaries in Cyber Warfare 327 $aDefense in DepthComputer Controlled Infrastructure; Organizational View; Where Cyber Fits in the War-Fighting Domains; Land; Sea; Air; Space; Cyber Domain; Summary; References; 3 Cyber Doctrine; Current US Doctrine; US Forces; US Air Force; US Navy; US Army; DoD INFOCONs; Sample Doctrine / Strategy From Around the World; Chinese Doctrine; Other Asian countries; European Countries; Private or Mercenary Armies; Some Key Military Principles that Must be Adapted to Cyber Warfare; Intelligence Preparation of the Operational Environment (IPOE); Joint Munitions Effectiveness Manual (JMEM) 327 $aMeasures of Effectiveness (MOE)Battle Damage Assessment (BDA); Close Air Support (CAS); Counterinsurgency (COIN); Summary; References; 4 Tools and Techniques; Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Physical Weapons; How the Logical and Physical Realms are Connected; Logical Systems Run on Physical Hardware; Logical Attacks Can Have Physical Effects; Infrastructure Concerns; What is SCADA?; What Security Issues are Present in the World of SCADA? 327 $aWhat are the Consequences of SCADA Failures?Supply Chain Concerns; Compromised Hardware; Deliberately Corrupted Components; Non-Technical Issues; Tools for Physical Attack and Defense; Electromagnetic Attacks; Electromagnetic Pulse (EMP) Weapons; Jamming; Defense Against Conventional Attacks; Summary; References; 5 Offensive Tactics and Procedures; Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Open Source Intelligence; Passive Reconnaissance; Surveillance; Voice Surveillance; Data Surveillance; Large Scale Surveillance Programs 327 $aUses of Surveillance DataComputer Network Attack; Waging War in the Cyber Era; Physical Warfare; Electronic Warfare; Logical Warfare; Reactive vs Proactive Attacks; The Attack Process; Recon; Scan; Access; Escalate; Exfiltrate; Assault; Sustain; Obfuscate; Summary; References; 6 Psychological Weapons; Social Engineering Explained; Is Social Engineering science?; SE Tactics Techniques and Procedures (TTPs); Types of SE approaches; Types of SE methodologies; How the Military Approaches Social Engineering; Army Doctrine; How the Military Defends against Social Engineering; How the Army Does CI 327 $aAn Air Force Approach 330 $a The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahe 606 $aInternet$xSecurity measures 606 $aComputer networks$xSecurity measures 606 $aInformation warfare 608 $aElectronic books. 615 0$aInternet$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 615 0$aInformation warfare. 676 $a005.8 700 $aWinterfeld$b Steve$0865160 701 $aAndress$b Jason$0865161 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462134603321 996 $aThe basics of cyber warfare$91931081 997 $aUNINA