Waging cyber war : technical challenges and operational constraints /
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the d...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Berkeley, CA] :
Apress,
[2019]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Cyber and Warfare; Definition; Declaration; Just War Theory; Jus ad Bellum; Jus in Bello; International Agreements; Expectation of Protection; Summary; Chapter 2: Legal Authority; Title 50-Intelligence Community; Title 10-Department of Defense; Maintaining Military Operations; Covert Action; Bringing It Together; Known US Responses; Example 1; Example 2; Example 3; Example 4; Espionage; Defining Espionage; Title 18; Cyber and Espionage; Summary; Chapter 3: Cyber Exploitation
- Refined DefinitionExploitation; Types of Exploitation; Code Vulnerability; Misconfiguration; Human Mistake; Illegitimate Use of Legitimate Credentials; Valuing Vulnerability Categories; Title Implications; Summary; Chapter 4: Cyber-Attack; Attack Types; Denying the Enemy; Attacks that Degrade; Non-cyber Example; Cyber Example; Cyber-Physical Example; Attacks that Disrupt; Non-cyber Example; Cyber Example; Cyber-Physical Example; Attacks that destroy; Non-cyber Example; Cyber Example; Cyber-Physical Example; Manipulating the Enemy; Human Perception: Aggressive; Non-cyber Example; Cyber Example
- Cyber-Physical ExampleHuman Perception: Protective; Non-cyber Example; Cyber Example; Cyber-Physical Example; Sensor Perception: Aggressive; Non-cyber Example; Cyber Example; Cyber-Physical Example; Sensor Perception: Protective; Non-cyber Example; Cyber Example; Cyber-Physical Example; Espionage; Summary; Chapter 5: Cyber Collection; Cyber Intelligence Gathering; Cyber Domain Collection Examples; Open Source Collection; Non-cyber Example; Cyber Intelligence Example; Cyber Reconnaissance Example; Human Source Collection; Non-cyber Example; Cyber Intelligence Example
- Cyber Reconnaissance ExamplePhysical-Cyber Example; Direct Collection; Non-cyber Example; Cyber Intelligence Example; Cyber Reconnaissance Example; Physical-Cyber Example; Indirect Collection; Non-cyber Example; Cyber Intelligence Example; Cyber Reconnaissance Example; Physical-Cyber Example; Understanding the Trade-Off; Summary; Chapter 6: Enemy Attribution; Logical Process of Attribution; Discovery; Association; Identification; Motivation; Post-attribution Process; Is Active Response Itself Appropriate?; Active Responses; Attack Responses; Non-attack Responses; Attributes
- Technical AttributesExploit Tools; Access Tools; Attack Effects; Redirection Points; Time; Tactical Attributes; Timing; Targets; Sophistication; Forget Everything You Thought You Knew; Unsteady Foundation; Summary; Chapter 7: Targeting; Tactical vs. Strategic Response; Target Selection; Appropriate Targets; The Cyber Option; Existing Capability; Developing the Capability; Access to the Target; BDA; Target Fidelity; Rules of Engagement; Method; Success; Abort; Failure; Summary; Chapter 8: Access; Access Tools; Levels of Access; Local Unprivileged; Local Privileged; Non-local Unprivileged