Book Image

Cyber Warfare – Truth, Tactics, and Strategies

By : Dr. Chase Cunningham
Book Image

Cyber Warfare – Truth, Tactics, and Strategies

By: Dr. Chase Cunningham

Overview of this book

The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare – Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data.
Table of Contents (14 chapters)
11
Other Books You May Enjoy
12
Index
Appendix – Major Cyber Incidents Throughout 2019

To get the most out of this book

  • Existing cyber security planners and strategists will gain insight into the reality of the space and will be better able to understand how future innovations part of that future state will be.
  • This is not a how-to guide; the author does not wish to provide readers with knowledge that could potentially be turned to malicious purposes, but rather this book aims to provide the reader with a new perspective, to see and prepare for what is coming, rather than to be blinded by the threats that are more imminent.
  • Cyber security experience is assumed; however, the book also features introductory concepts, which even beginners can take advantage of.

Download the color images

We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://static.packt-cdn.com/downloads/9781839216992_ColorImages.pdf.

Conventions used

CodeInText: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. For example: "Changeme.py focuses on detecting default and backdoor credentials, and not just common account credentials."

Bold: Indicates a new term, an important word, or words that you see on the screen, for example, in menus or dialog boxes, also appear in the text like this. For example: "The first, and arguably most important, technology is commonly called Software-Defined Networking (SDN)."