Book Image

Cyber Warfare – Truth, Tactics, and Strategies

By : Dr. Chase Cunningham
Book Image

Cyber Warfare – Truth, Tactics, and Strategies

By: Dr. Chase Cunningham

Overview of this book

The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare – Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data.
Table of Contents (14 chapters)
11
Other Books You May Enjoy
12
Index
Appendix – Major Cyber Incidents Throughout 2019

A

Adaptive Security Platform (ASP) 239

Advanced Persistent Threats (APTs) 7, 8, 11

anti-virus

growth 6

application programming interfaces (APIs) 74

applications

insecurity 40, 41

application whitelisting 214

types 215, 217

APT attack

advanced 8

persistent 9

threat 9

APT attacks 12, 13

artificial intelligence (AI) 284

attacks

downstream 56, 57

examples 50, 52

authentication methods

failure 41, 42, 44, 45

autonomous vehicle

security issues 59, 60, 62, 63

B

biometrics

as authentication program 274

brain wave-based authentication 274

Bring Your Own Device (BYOD) 25

C

campaigns

mapping, to matrices 146, 147, 149, 150, 151

changeme.py

reference link 265

Chief Information Officer (CIO) 182

Chief Information Security Officers (CISOs) 182

Chinese APT threat groups 10

Chinese manufacturing campaign 141, 143

Command and Control (C2)

modifying 152

comment...