Atjaunināt sīkdatņu piekrišanu

Cyberwarfare: Information Operations in a Connected World 2nd edition [Mīkstie vāki]

4.00/5 (13 ratings by Goodreads)
  • Formāts: Paperback / softback, 425 pages, weight: 765 g
  • Izdošanas datums: 25-Oct-2021
  • Izdevniecība: Jones and Bartlett Publishers, Inc
  • ISBN-10: 1284225445
  • ISBN-13: 9781284225440
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 106,73 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 425 pages, weight: 765 g
  • Izdošanas datums: 25-Oct-2021
  • Izdevniecība: Jones and Bartlett Publishers, Inc
  • ISBN-10: 1284225445
  • ISBN-13: 9781284225440
Citas grāmatas par šo tēmu:
"Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations-operations in which it has become almost impossible to separate cyberwarfare from traditional warfare"--

Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations -- operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered--from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare; its interaction with military doctrine; and the Pandora's box opened by recent events, which have set the stage for future cyber attacks.
Preface xvii
Acknowledgments xxi
About the Authors xxiii
Part One The Cyberwarfare Landscape
Chapter 1 Information as a Military Asset
3(26)
What Is Cyberwarfare?
5(3)
Likelihood of Cyberwar
6(2)
The Evolving Nature of War
8(1)
The Role of Information in Armed Conflict
9(4)
Ancient Warfare
9(1)
World Wars
10(2)
Cold War
12(1)
Iraq War and Weapons of Mass Destruction
12(1)
Domains of Warfare
13(2)
Exploring the Cyber Domain
15(1)
Offensive Information Operations
15(1)
Defensive Information Operations
16(1)
Information Operations Techniques
16(9)
Computer Network Attack
18(1)
Computer Network Defense
18(1)
Intelligence Gathering
19(1)
Electronic Warfare
19(1)
Psychological Operations
20(1)
Military Deception
21(1)
Operations Security
21(2)
Identification of Critical Information
23(1)
Threat Analysis
23(1)
Vulnerability Analysis
23(1)
Risk Assessment
24(1)
Countermeasure Implementation
24(1)
Summary
25(1)
Key Concepts And Terms
25(1)
Assessment
26(3)
Chapter 2 Targets and Combatants
29(28)
Traditional Military Targets
32(7)
Military Targets in Conventional Warfare
33(1)
Acceptable Targets, Treaties, and International Law
34(2)
Cyber Targets in Unconventional Warfare
36(1)
Targets in Asymmetric Cyberwarfare
37(1)
Total Cyberwarfare
38(1)
Cyberwarfare Targets
39(8)
Cyberwarfare against Traditional Military Targets
39(1)
Iran versus U.S. Drones
39(2)
Flame: Replacing Spies with Software
41(1)
The First U.S. Cyberwar Strike: Serbia and Kosovo
41(1)
Nontraditional Cyberwarfare Targets
42(1)
Political Activism and Hacktivism
42(2)
Industrial Espionage
44(2)
Military Cyberattacks on Nontraditional Targets
46(1)
Targets of Information Operations
47(1)
Combatants in Cyberwarfare
47(4)
Military Forces
48(1)
U.S. Cyber Command
48(1)
Guerrilla Cyberwarriors and Insurrectionists
49(1)
Individuals and Small Groups
50(1)
The Jester
51(1)
Comparing Traditional Warfare, Guerrilla Warfare, and Cyberwarfare
51(4)
How Cyberattack Differs from Traditional War
52(2)
The Element of Surprise
54(1)
Deniability
54(1)
Summary
55(1)
Key Concepts And Terms
55(1)
Assessment
56(1)
Chapter 3 Cyberwarfare, Law, and Ethics
57(22)
Kinetic Warfare
59(2)
International Law and Kinetic Warfare
59(2)
Legal Review and Legality of Actions
61(1)
Cyberwarfare Law
61(15)
Cyberwarfare in a Kinetic Warfare Context
61(1)
Kinetic Warfare Law in a Cyber Context
62(1)
The Tallinn Manual
63(2)
Sovereignty, Jurisdiction, and Control
65(1)
Sovereignty
65(1)
Jurisdiction
65(1)
Control
66(1)
Responsibility
67(1)
Mercenaries
68(1)
The Use of Force
69(1)
Measuring Force
70(1)
Threats of Force
71(1)
Self-Defense
72(1)
International Governmental Organizations
73(1)
Civilians and Infrastructure
73(1)
Civilians and Military Use of the Internet
73(1)
Prohibited Targets: Children, Journalists, Medical and Religious Personnel, and Nature
74(1)
The Conduct of Attacks and Indiscriminate Means
75(1)
Espionage, Treachery, and Ruses
75(1)
Neutrality
76(1)
Ethics and Cyberwarfare
76(1)
Summary
77(1)
Key Concepts And Terms
78(1)
Assessment
78(1)
Chapter 4 Intelligence Operations in a Connected World
79(22)
Intelligence Operations
81(5)
The Intelligence Cycle
81(1)
Planning and Direction
82(1)
Collection
83(1)
Processing and Exploitation
83(1)
Analysis and Production
84(1)
Dissemination
84(2)
Intelligence Disciplines
86(8)
Human Intelligence (HUMINT)
86(3)
Signals Intelligence (SIGINT)
89(1)
Open Source Intelligence (OSINT)
90(1)
Geospatial Intelligence (GEOINT)
91(2)
Measurement and Signature Intelligence (MASINT)
93(1)
Intelligence Support to Cyberwarfare
94(1)
Supporting Offensive Cyberwarfare
94(1)
Supporting Defensive Cyberwarfare
94(1)
Case Studies: Media Reporting on Intelligence Activities
95(2)
Echelon
95(1)
Telephone Metadata
96(1)
Data Center Eavesdropping
96(1)
Follow the Money
96(1)
Quantum
97(1)
Summary
97(1)
Key Concepts And Terms
98(1)
Assessment
98(3)
Part Two Offensive and Defensive Cyberwarfare 101(240)
Chapter 5 The Evolving Threat: From Script Kiddies to Advanced Attackers
103(24)
The Changing Threat Model
105(4)
Historical Hacking
105(1)
Modern Hacking
106(1)
Opportunistic Attacks
106(1)
Semi-Targeted Attacks
107(2)
Inside the Advanced Persistent Threat
109(4)
Characteristics of the APT
110(1)
APT Motivations
110(1)
Military/Political
111(1)
Cybercrime and Corporate Espionage
111(1)
Activism
111(1)
APT Tradecraft
111(1)
Zero-Day Attacks
112(1)
Malware
112(1)
Social Engineering and Phishing
113(1)
Strategic Web Compromises
113(1)
The Cyber Kill Chain®
113(10)
Reconnaissance
114(2)
Weaponize
116(1)
Deliver
117(1)
Exploit
118(1)
Install
119(1)
Command and Control
120(2)
Act on Objectives
122(1)
Summary
123(1)
Key Concepts And Terms
123(1)
Assessment
124(3)
Chapter 6 Social Engineering and Cyberwarfare
127(24)
Humans: The Weak Link
129(1)
Social Engineering
130(1)
Influence as a Weapon
131(8)
Reciprocity
132(1)
Commitment and Consistency
133(2)
Social Proof
135(1)
Authority
135(2)
Liking
137(1)
Scarcity
138(1)
Tools of the Social Engineer
139(4)
Pretexting
139(2)
Phishing
141(2)
Baiting
143(1)
Defending against Social Engineering
143(2)
Security Awareness and Education
143(1)
Incident Reporting and Response
144(1)
Content Filtering
144(1)
Penetration Testing
145(1)
Robin Sage: A Case Study in Social Engineering
145(2)
Summary
147(1)
Key Concepts And Terms
147(1)
Assessment
148(3)
Chapter 7 Weaponizing Cyberspace: A History
151(20)
Early Attacks: The 1990s
153(4)
Solar Sunrise
153(2)
Moonlight Maze
155(2)
Honker Union
157(1)
The 2000s: The Worm Turns
157(5)
Code Red
158(1)
SQL Slammer
159(1)
Titan Rain
159(1)
Stakkato
160(1)
Poison Ivy
161(1)
Senior Suter
161(1)
Stuxnet and the 21st Century
162(5)
Stuxnet
162(1)
Operation Aurora
162(2)
Duqu
164(1)
Flame
164(1)
FOXACID
165(1)
Careto
165(1)
Russia's Ukraine Campaign
166(1)
USCYBERCOM Action Against Russia
166(1)
Summary
167(1)
Key Concepts And Terms
167(1)
Assessment
168(3)
Chapter 8 Nonstate Actors in Cyberwar
171(22)
Understanding Nonstate Actors
173(4)
Nongovernmental Organizations
173(1)
Organized Crime
173(1)
Corporations
174(1)
Terrorists and Activists
175(1)
Individuals and the Media
175(2)
The Roles of Nonstate Actors in Cyberwar
177(2)
Targets
178(1)
Participants
178(1)
Critics
179(1)
NGOs in Cyberwar
179(2)
Aid Groups
179(1)
Diplomatic Organizations
180(1)
Religious Organizations
181(1)
Organized Crime
181(2)
Corporations
183(2)
Industrial Espionage
183(1)
Cooperation with Intelligence Agencies
184(1)
Terrorists and Activists
185(2)
Estonia
185(1)
Syrian Electronic Army
185(1)
Anonymous
186(1)
Individuals and the Media
187(3)
Individual Motivations
187(1)
Hackers
188(1)
Leakers and Whistleblowers
188(2)
Summary
190(1)
Key Concepts And Terms
190(1)
Assessment
190(3)
Chapter 9 Defense-in-Depth Strategies
193(32)
Defense in Depth
195(4)
Defense-in-Depth Strategies
199(7)
The NSA People, Technology, and Operations Defense Strategy
199(1)
People
199(1)
Technology
200(1)
Operations
200(2)
The 20 CIS Controls
202(1)
The Department of Homeland Security and Defense in Depth
203(1)
Computer Network Defense and Defense in Depth
204(2)
Where and Why Defense in Depth Fails
206(6)
Neglecting Layers: Getting Past the Shell
206(2)
System Administrators: Trusted Attackers
208(1)
Attacking the User: Human Factors
209(1)
Changes in Technology
210(2)
Designing a Modern CND Strategy
212(10)
Dynamic Defense
212(1)
CND and Defense-in-Depth Design
213(1)
Risk and Threats
214(1)
Secure Networks
215(1)
Network Enclaves and Properties
215(2)
Monitoring
217(1)
Cryptography
218(1)
Defense against Malware
218(1)
Endpoint Security Design
219(2)
Physical Security
221(1)
Summary
222(1)
Key Concepts And Terms
222(1)
Assessment
223(2)
Chapter 10 Cryptography and Cyberwar
225(34)
An Introduction to Cryptography
227(14)
Cryptographic Concepts
228(1)
Ciphers and Encryption
229(1)
Key Encryption Terms
229(1)
Symmetric Ciphers
230(2)
Enigma: Using and Breaking Wartime Symmetric Encryption
232(1)
Asymmetric Ciphers
233(4)
Modern Cryptosystems
237(1)
Data Encryption Standard
237(1)
Triple DES
238(1)
Advanced Encryption Standard
239(1)
RSA
239(1)
Hashing and Message Digests
239(2)
Cryptography in Cyberwar
241(3)
Computer Network Defense and Cryptographic Systems
241(2)
Computer Network Attack and Cryptographic Systems
243(1)
Attacking Cryptography
244(3)
Brute Force
245(1)
Acquiring the Keys
245(1)
Attacking the Algorithm
246(1)
NSA and RSA
246(1)
Defeating Attacks on Cryptographic Systems
247(1)
Defenses
247(1)
Defense in Depth Using Cryptographic Systems
247(1)
Weaponizing Cryptography
248(5)
Defensive Cryptography: Malware Encryption
248(1)
Offensive Cryptography
249(1)
Zeus
249(3)
Cryptolocker and Other Ransomware Malware
252(1)
The Future of Cryptography in Cyberwar
253(2)
Attacks
253(1)
Defenses
254(1)
Summary
255(1)
Key Concepts And Terms
256(1)
Assessment
256(3)
Chapter 11 Defending Endpoints
259(30)
Cyberwarfare Endpoints
261(1)
Types of Endpoints
262(9)
Computers
263(1)
Mobile Devices
264(1)
Industrial Control Systems
264(1)
Supervisory Control and Data Acquisition Systems
264(1)
Distributed Control Systems
265(1)
Programmable Logic Controllers
265(2)
Military Systems
267(1)
Drones and Remote Platforms
267(1)
Weapons Systems
268(1)
Command and Control
268(1)
Embedded Systems
269(2)
Attacking Endpoints
271(1)
Protecting Endpoints
272(3)
U.S. Department of Defense Strategy
273(2)
Zero Trust and Endpoint Security
275(12)
Physical Security
275(1)
Policy
275(1)
Procedures
276(1)
Configuration Standards
277(1)
Central Management
277(1)
Configuration Management
278(1)
Patches and Updates
278(1)
Awareness
279(1)
Information Sharing
279(1)
Anti-Malware and Antivirus
280(1)
Network Protection
280(1)
Encryption
281(1)
Allow Listing and Deny Listing
282(3)
Testing
285(2)
Summary
287(1)
Key Concepts And Terms
287(1)
Assessment
288(1)
Chapter 12 Defending Networks
289(30)
Network Defense in Depth
291(3)
Identify, Protect, Detect, Respond, and Recover in the Context of Network Defense
294(1)
Mission Assurance
295(4)
Surviving Attacks
297(1)
Network Operational Procedures
298(1)
Network Security Design
299(2)
Classification
300(1)
Network Defense Technologies
301(12)
Zero Trust
302(1)
Protocols
302(1)
Border Gateway Protocol
303(1)
Transport Layer Security
303(1)
IPsec
303(1)
Network Access Control
303(1)
Network Firewalls
304(2)
Routers and Switches
306(1)
Network Security Boundaries
307(1)
Virtual LANs
307(2)
Intrusion Detection and Prevention Systems
309(1)
Security Information and Event Management Systems
310(1)
Physical Network Protection
310(1)
Wireless Network Security
311(1)
Remote Access and Administration
311(2)
Active Defense
313(3)
Honeypots, Honeynets, and Darknets
314(1)
Active Response
315(1)
Summary
316(1)
Key Concepts And Terms
316(1)
Assessment
317(2)
Chapter 13 Defending Data
319(22)
Data Classification
321(4)
Data Loss and Prevention
325(7)
Data Spills
325(2)
Data Loss Prevention
327(3)
Encryption and Data Loss
330(2)
Data Integrity and Availability
332(2)
Integrity
332(1)
Availability
333(1)
Backups
333(1)
Redundancy
333(1)
Data Retention and Disposal
334(4)
Data Life Cycle Management
334(1)
Data Labeling
335(1)
Drives and Media Management
336(2)
Data Loss Response
338(1)
Summary
339(1)
Key Concepts And Terms
339(1)
Assessment
340(1)
Part Three The Future of Cyberwarfare 341(40)
Chapter 14 Cyberwarfare and Military Doctrine
343(16)
Military Doctrine
344(5)
Principles of War
345(2)
Forms of Warfare
347(1)
Levels of Warfare
348(1)
Cyberattack Strikes the Air Force
349(1)
Organizing for Cyber Operations
350(4)
U.S. Strategic Command (USSTRATCOM)
353(1)
U.S. Cyber Command (USCYBERCOM)
353(1)
Five Pillars of Cyberwarfare
354(2)
Summary
356(1)
Key Concepts And Terms
356(1)
Assessment
357(2)
Chapter 15 Pandora's Box: The Future of Cyberwarfare
359(22)
The Future of Cyberwar
362(1)
Blurred Boundaries: Cyberwar and Nonstate Actors
363(10)
Advanced Persistent Threats
367(2)
Continuous Warfare
369(2)
Integrating Cyberwar and Kinetic Warfare
371(1)
Alliances and Partnerships
371(2)
International Law and Cyberwarfare
373(1)
Networks Everywhere: Cyberwar in a Highly Connected World
374(2)
Cyberwar and Infrastructure
376(1)
Advanced Tools and Training
376(2)
The Future of Defensive Cyberwar
378(1)
Summary
379(1)
Key Concepts And Terms
379(2)
Assessment
Appendix A Answer Key 381(2)
Appendix B Standard Acronyms 383(4)
Glossary of Key Terms 387(12)
References 399(16)
Index 415
MIKE CHAPPLE, PhD, is teaching professor of information technology at the University of Notre Dames Mendoza College of Business.'He previously served as Notre Dames Senior Director for IT Service Delivery, where he oversaw the information security function.' In past positions, he served as both a consultant and an active duty Air Force officer. He is a technical editor for Information Security magazine and has written 25 other books, including the Security+ Study Guide, Information Security Illuminated, and the Official CISSP Study Guide. He earned his undergraduate and PhD degrees from Notre Dame in computer science and engineering. He also holds a masters degree in computer science from the University of Idaho and an MBA from Auburn University.

David Seidl is the Vice President for Information Technology and CIO at Miami University of Ohio. During his career, he has served in a variety of technical and information security roles including serving at the Senior Director for Campus Technology Services at the University of Notre Dame where he oversaw cloud operations, ERP, databases, identity management, and a broad range of other technologies and services. He also served as Notre Dame's Director of Information Security, led Notre Dame's information security program, and previously taught a popular course on networking and security for Notre Dame's Mendoza College of Business. David has written books on security certification and cyberwarfare including the Security+ Study Guide, The CYSA+ Study Guide, The Official (ISC)2 Practice Tests, and numerous other books. David holds a bachelor's degree in Communication Technology and a masters degree in Information Security from Eastern Michigan University, as well as CISSP, GPEN, GCIH, CSA+ , and Pentest+ certifications.