top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
Autore Winterfeld Steve
Edizione [1st edition]
Pubbl/distr/stampa Boston, : Syngress, c2013
Descrizione fisica 1 online resource (169 p.)
Disciplina 005.8
Altri autori (Persone) AndressJason
Collana Syngress basics series The basics of cyber warfare
Soggetto topico Internet - Security measures
Computer networks - Security measures
Information warfare
Soggetto genere / forma Electronic books.
ISBN 1-283-81084-0
0-12-405181-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Half Title; Title page; Copyright; Dedication; Contents; Author Biography; Introduction; 1 Cyber Threatscape; How Did We Get Here?; Attack Methodology Plus Tools/Techniques Used; Attackers (The Types of Threats); How Most Organizations Defend Today (Defensive Mountain Range)?; Targeted Capabilities (What We Should be Defending); Summary; References; 2 Cyberspace Battlefield Operations; What is Cyber Warfare?; Definition for Cyber Warfare; Tactical and Operational Reasons for Cyber War; Cyber Strategy and Power; Cyber Arms Control; Cyber War-Hype or Reality; Boundaries in Cyber Warfare
Defense in DepthComputer Controlled Infrastructure; Organizational View; Where Cyber Fits in the War-Fighting Domains; Land; Sea; Air; Space; Cyber Domain; Summary; References; 3 Cyber Doctrine; Current US Doctrine; US Forces; US Air Force; US Navy; US Army; DoD INFOCONs; Sample Doctrine / Strategy From Around the World; Chinese Doctrine; Other Asian countries; European Countries; Private or Mercenary Armies; Some Key Military Principles that Must be Adapted to Cyber Warfare; Intelligence Preparation of the Operational Environment (IPOE); Joint Munitions Effectiveness Manual (JMEM)
Measures of Effectiveness (MOE)Battle Damage Assessment (BDA); Close Air Support (CAS); Counterinsurgency (COIN); Summary; References; 4 Tools and Techniques; Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Physical Weapons; How the Logical and Physical Realms are Connected; Logical Systems Run on Physical Hardware; Logical Attacks Can Have Physical Effects; Infrastructure Concerns; What is SCADA?; What Security Issues are Present in the World of SCADA?
What are the Consequences of SCADA Failures?Supply Chain Concerns; Compromised Hardware; Deliberately Corrupted Components; Non-Technical Issues; Tools for Physical Attack and Defense; Electromagnetic Attacks; Electromagnetic Pulse (EMP) Weapons; Jamming; Defense Against Conventional Attacks; Summary; References; 5 Offensive Tactics and Procedures; Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Open Source Intelligence; Passive Reconnaissance; Surveillance; Voice Surveillance; Data Surveillance; Large Scale Surveillance Programs
Uses of Surveillance DataComputer Network Attack; Waging War in the Cyber Era; Physical Warfare; Electronic Warfare; Logical Warfare; Reactive vs Proactive Attacks; The Attack Process; Recon; Scan; Access; Escalate; Exfiltrate; Assault; Sustain; Obfuscate; Summary; References; 6 Psychological Weapons; Social Engineering Explained; Is Social Engineering science?; SE Tactics Techniques and Procedures (TTPs); Types of SE approaches; Types of SE methodologies; How the Military Approaches Social Engineering; Army Doctrine; How the Military Defends against Social Engineering; How the Army Does CI
An Air Force Approach
Record Nr. UNINA-9910462134603321
Winterfeld Steve  
Boston, : Syngress, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
The basics of cyber warfare [[electronic resource] ] : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
Autore Winterfeld Steve
Edizione [1st edition]
Pubbl/distr/stampa Boston, : Syngress, c2013
Descrizione fisica 1 online resource (169 p.)
Disciplina 005.8
Altri autori (Persone) AndressJason
Collana Syngress basics series The basics of cyber warfare
Soggetto topico Internet - Security measures
Computer networks - Security measures
Information warfare
ISBN 1-283-81084-0
0-12-405181-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Half Title; Title page; Copyright; Dedication; Contents; Author Biography; Introduction; 1 Cyber Threatscape; How Did We Get Here?; Attack Methodology Plus Tools/Techniques Used; Attackers (The Types of Threats); How Most Organizations Defend Today (Defensive Mountain Range)?; Targeted Capabilities (What We Should be Defending); Summary; References; 2 Cyberspace Battlefield Operations; What is Cyber Warfare?; Definition for Cyber Warfare; Tactical and Operational Reasons for Cyber War; Cyber Strategy and Power; Cyber Arms Control; Cyber War-Hype or Reality; Boundaries in Cyber Warfare
Defense in DepthComputer Controlled Infrastructure; Organizational View; Where Cyber Fits in the War-Fighting Domains; Land; Sea; Air; Space; Cyber Domain; Summary; References; 3 Cyber Doctrine; Current US Doctrine; US Forces; US Air Force; US Navy; US Army; DoD INFOCONs; Sample Doctrine / Strategy From Around the World; Chinese Doctrine; Other Asian countries; European Countries; Private or Mercenary Armies; Some Key Military Principles that Must be Adapted to Cyber Warfare; Intelligence Preparation of the Operational Environment (IPOE); Joint Munitions Effectiveness Manual (JMEM)
Measures of Effectiveness (MOE)Battle Damage Assessment (BDA); Close Air Support (CAS); Counterinsurgency (COIN); Summary; References; 4 Tools and Techniques; Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Physical Weapons; How the Logical and Physical Realms are Connected; Logical Systems Run on Physical Hardware; Logical Attacks Can Have Physical Effects; Infrastructure Concerns; What is SCADA?; What Security Issues are Present in the World of SCADA?
What are the Consequences of SCADA Failures?Supply Chain Concerns; Compromised Hardware; Deliberately Corrupted Components; Non-Technical Issues; Tools for Physical Attack and Defense; Electromagnetic Attacks; Electromagnetic Pulse (EMP) Weapons; Jamming; Defense Against Conventional Attacks; Summary; References; 5 Offensive Tactics and Procedures; Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Open Source Intelligence; Passive Reconnaissance; Surveillance; Voice Surveillance; Data Surveillance; Large Scale Surveillance Programs
Uses of Surveillance DataComputer Network Attack; Waging War in the Cyber Era; Physical Warfare; Electronic Warfare; Logical Warfare; Reactive vs Proactive Attacks; The Attack Process; Recon; Scan; Access; Escalate; Exfiltrate; Assault; Sustain; Obfuscate; Summary; References; 6 Psychological Weapons; Social Engineering Explained; Is Social Engineering science?; SE Tactics Techniques and Procedures (TTPs); Types of SE approaches; Types of SE methodologies; How the Military Approaches Social Engineering; Army Doctrine; How the Military Defends against Social Engineering; How the Army Does CI
An Air Force Approach
Record Nr. UNINA-9910785913803321
Winterfeld Steve  
Boston, : Syngress, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / / Steve Winterfield, Jason Andress
Autore Winterfeld Steve
Edizione [1st edition]
Pubbl/distr/stampa Boston, : Syngress, c2013
Descrizione fisica 1 online resource (169 p.)
Disciplina 005.8
355.343
Altri autori (Persone) AndressJason
Collana Syngress basics series The basics of cyber warfare
Soggetto topico Internet - Security measures
Computer networks - Security measures
Information warfare
ISBN 1-283-81084-0
0-12-405181-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Half Title; Title page; Copyright; Dedication; Contents; Author Biography; Introduction; 1 Cyber Threatscape; How Did We Get Here?; Attack Methodology Plus Tools/Techniques Used; Attackers (The Types of Threats); How Most Organizations Defend Today (Defensive Mountain Range)?; Targeted Capabilities (What We Should be Defending); Summary; References; 2 Cyberspace Battlefield Operations; What is Cyber Warfare?; Definition for Cyber Warfare; Tactical and Operational Reasons for Cyber War; Cyber Strategy and Power; Cyber Arms Control; Cyber War-Hype or Reality; Boundaries in Cyber Warfare
Defense in DepthComputer Controlled Infrastructure; Organizational View; Where Cyber Fits in the War-Fighting Domains; Land; Sea; Air; Space; Cyber Domain; Summary; References; 3 Cyber Doctrine; Current US Doctrine; US Forces; US Air Force; US Navy; US Army; DoD INFOCONs; Sample Doctrine / Strategy From Around the World; Chinese Doctrine; Other Asian countries; European Countries; Private or Mercenary Armies; Some Key Military Principles that Must be Adapted to Cyber Warfare; Intelligence Preparation of the Operational Environment (IPOE); Joint Munitions Effectiveness Manual (JMEM)
Measures of Effectiveness (MOE)Battle Damage Assessment (BDA); Close Air Support (CAS); Counterinsurgency (COIN); Summary; References; 4 Tools and Techniques; Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Physical Weapons; How the Logical and Physical Realms are Connected; Logical Systems Run on Physical Hardware; Logical Attacks Can Have Physical Effects; Infrastructure Concerns; What is SCADA?; What Security Issues are Present in the World of SCADA?
What are the Consequences of SCADA Failures?Supply Chain Concerns; Compromised Hardware; Deliberately Corrupted Components; Non-Technical Issues; Tools for Physical Attack and Defense; Electromagnetic Attacks; Electromagnetic Pulse (EMP) Weapons; Jamming; Defense Against Conventional Attacks; Summary; References; 5 Offensive Tactics and Procedures; Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Open Source Intelligence; Passive Reconnaissance; Surveillance; Voice Surveillance; Data Surveillance; Large Scale Surveillance Programs
Uses of Surveillance DataComputer Network Attack; Waging War in the Cyber Era; Physical Warfare; Electronic Warfare; Logical Warfare; Reactive vs Proactive Attacks; The Attack Process; Recon; Scan; Access; Escalate; Exfiltrate; Assault; Sustain; Obfuscate; Summary; References; 6 Psychological Weapons; Social Engineering Explained; Is Social Engineering science?; SE Tactics Techniques and Procedures (TTPs); Types of SE approaches; Types of SE methodologies; How the Military Approaches Social Engineering; Army Doctrine; How the Military Defends against Social Engineering; How the Army Does CI
An Air Force Approach
Record Nr. UNINA-9910815299503321
Winterfeld Steve  
Boston, : Syngress, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyber warfare : techniques, tactics and tools for security practitioners
Cyber warfare : techniques, tactics and tools for security practitioners
Edizione [Second edition.]
Pubbl/distr/stampa Waltham, Massachusetts, : Syngress, an imprint of Elsevier, [2014]
Descrizione fisica 1 online resource (325 p.)
Altri autori (Persone) WinterfeldSteve
AblonLillian
AndressJason
Soggetto topico Information warfare
Computer networks - Security measures
Cyberkrig
Soggetto genere / forma Electronic books.
ISBN 0-12-416633-4
Classificazione 355.02
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
Record Nr. UNINA-9910453152003321
Waltham, Massachusetts, : Syngress, an imprint of Elsevier, [2014]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui