Book Image

Cyber Warfare – Truth, Tactics, and Strategies

By : Dr. Chase Cunningham
Book Image

Cyber Warfare – Truth, Tactics, and Strategies

By: Dr. Chase Cunningham

Overview of this book

The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare – Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data.
Table of Contents (14 chapters)
11
Other Books You May Enjoy
12
Index
Appendix – Major Cyber Incidents Throughout 2019

Conclusion

In this chapter, we discussed some of the larger principles that can be applied from physical warfighting practices to applications within cyber warfare. While, arguably, the two domains are different in form, there are approaches and useful capabilities that can be employed across the chasm between the two. There is a requirement in warfare to focus fire on the enemy where they are, not where they will be.

In cyberspace, the requirement is to do both of those things simultaneously. This means defenders must intelligently protect their internal assets as well as actively defend the users as they operate on their own personal devices "outside the wire." There are ways to enable this activity, but it often requires vendor-specific solutions and capabilities as open source solutions are not built to the scale and functionality that is needed. Using those solutions can be a valuable approach to addressing these issues.

In the next chapter, we will analyze...