The Basics of Cyber Warfare

  • ID: 2485163
  • Book
  • 164 Pages
  • Elsevier Science and Technology
1 of 4

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology.

The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.

  • Provides a sound understanding of the tools and tactics used in cyber warfare.
  • Describes both offensive and defensive tactics from an insider's point of view.
  • Presents doctrine and hands-on techniques to understand as cyber warfare evolves with technology.

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 4

Introduction

Threatscape

Military Doctrine

Cyber Doctrine

Tools and Techniques

Offensive Tactics and Procedures

Psychological Weapons / Social Engineering

Defensive Tactics and Procedures

Challenges We Face

The Future of Technology and Impacts on Cyber Warfare

Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Winterfeld, Steve
Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.
Andress, Jason
Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll