Cyber Warfare, Syngress

= C Y B E R W A R F A R E =

Techniques, Tactics and Toolsfor Security Practitioners

Jason Andress
Steve Winterfeld
Russ Rogers Technical Editor
Foreword by Stephen Northcutt

E-books Shop
Cyber Warfare

About the Authors
Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional
with a depth of experience in both the academic and business worlds. He is presently
employed by a major software company, providing global information security oversight,
and performing penetration testing, risk assessment, and compliance functions
to ensure that the company’s assets are protected.
Jason has taught undergraduate and graduate security courses since 2005 and
holds a Doctorate in Computer Science, researching in the area of data protection.
He has authored several publications and books, writing on topics including data
security, network security, penetration testing, and digital forensics.

Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma, and holds TS/SCI clearance)

 has a strong technical and leadership background in Cybersecurity, Military
Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.
Currently, he is the TASC Technical Lead for Cybersecurity and manager
of their TERANet research labs. He also directs their Vulnerability Assessment and Penetration
Test Team and is the primary instructor for their CyberWarrior™
Course on hacker mentality and methodology.
Previously, Steve built the Computer Emergency Response Center in support
of U.S. Army South, responsible for monitoring security real-time and conducting
forensic investigations on intrusions. He also led the team that produced the first
Global Hawk Unmanned Aerial System (UAS) C&A package. Steve was an Airborne
Ranger, EW Company Cdr, Armor Bn S2, Signal BN XO and finished his career as
Command and General Staff Instructor in the USAR. He has a MS in Computer
Information Systems and currently lives in Colorado with his family.

Acknowledgments
Jason Andress and Steve Winterfeld 
We thank our families and friends for their guidance, support, and fortitude throughout this project.
We dedicate this book to those in the security industry who are making the world a better place through efforts like Hackers for Charity
(You may have seen their T-shirts—“i hack charities.” For more information, go to http://hackersforcharity.org). To those who are not we say—get engaged!
Russ Rogers
Russ would like to thank his children, his father, and Tracie for being so supportive over the years. Thanks and shout outs go out to Chris Hurley, Mark Carey, Rob Bathurst, Pushpin, Paul Criscuolo, Ping Look, Greg Miles, Ryan Clarke, Luke McOmie, Curtis Letson, and Eddie Mize.

Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA


Table of Contents

Acknowledgments
About the Authors
About the Technical Editor
Foreword
Introduction
Chapter 1 What is Cyber Warfare?
Definition for Cyber Warfare Tactical and Operational Reasons for Cyber War 
Cyber Strategy and Power 
Cyber Arms Control 
What is the United States Doing About the Threat of a
Cyber War? 
Have We Seen a Cyber War?
Case Studies 
The Debate (Is it Real?) 
Why Cyber Warfare is Important
Summary
Endnotes
Chapter 2 The Cyberspace Battlefield
Boundaries in Cyber Warfare
Defense in Depth 
Physical Infrastructure 
Organizational View 
Where Cyber Fits in the War-fighting Domains
Land 
Sea 
Air 
Space 
Cyber Domain 
Threatscape
Most Active Threats 
Most Dangerous Threats 
Motivations 
Fielding Systems at the Speed of Need
Summary
Endnotes
Chapter 3 Cyber Doctrine
Current U.S. Doctrine
U.S. Forces 
U.S. Air Force 
U.S. Navy 
U.S. Army 
DoD INFOCONs 
Sample Doctrine/Strategy from Around the World
Chinese Doctrine 
Other Key Nations Developing Doctrine 
Translating Traditional Military Doctrine
IPOE 
JMEM 
MOE 
BDA 
CAS 
COIN 
Guidance and Directives
CNCI 
DHS 
HSPD 
NIST 
Academia and Industry Associations 
Operations and Exercises
Federal Exercises 
DoD Exercises 
Educational Exercises 
Sample MESLs 
Summary
Endnotes
Chapter 4 Cyber Warriors
What Does a Cyber Warrior Look Like?
Certifications 
Education and Training 
Experience and Skills 
Differences from Traditional Forces
Age 
Attitude 
Physical Condition 
Credentials 
Present Cyber Warfare Forces
U.S. 
China 
Russia 
France 
Israel 
Brazil 
Singapore 
South Korea 
North Korea 
Australia 
Malaysia 
Japan 
Canada 
United Kingdom 
Other Countries with Cyber Forces 
Corporate 
Criminal 
Staffing for Cyber War
Sources of Talent 
Training the Next Generation 
Summary
Endnotes
Chapter 5 Logical Weapons
Reconnaissance Tools
General Information Gathering 
Whois 
DNS 
Metadata 
Maltego 
Defense 
Scanning Tools
Access and Escalation Tools
Password Tools 
The Metasploit Project 
Immunity CANVAS 
Defense 
Exfiltration Tools
Physical Exfiltration 
Encryption and Steganography 
Using Common Protocols 
Out of Band Methods 
Defense 
Sustainment Tools
Adding “Authorized” Access 
Backdoors 
Defense 
Assault Tools
Meddling with Software 
Attacking Hardware 
Defense 
Obfuscation Tools
Location Obscuration 
Log Manipulation 
File Manipulation 
Defense 
Summary
Endnotes
Chapter 6 P hysical Weapons
How the Logical and Physical Realms are Connected
Logical Systems Run on Physical Hardware 
Logical Attacks Can Have Physical Effects 
Infrastructure Concerns
What is SCADA
What Security Issues are Present in the World of SCADA? 
What are the Consequences of SCADA Failures?
Supply Chain Concerns
Compromised Hardware 
Deliberately Corrupted Components 
Non-Technical Issues 
Tools for Physical Attack and Defense
Electromagnetic Attacks 
Covert Activity 
Summary
Endnotes
Chapter 7 P sychological Weapons
Social Engineering Explained
Is Social Engineering Science? 
SE Tactics Techniques and Procedures (TTPs) 
Types of SE Approaches 
Types of SE Methodologies 
How the Military Approaches Social Engineering
Army Doctrine 
How the Military Defends Against Social Engineering
How the Army does CI 
An Air Force Approach 
Summary
Endnotes
Chapter 8 Computer Network Exploitation
Intelligence and Counter-Intelligence
Sources of Cyber Attacks 
Attackers and Sponsors of Attacks 
Reconnaissance
Open Source Intelligence 
Passive Reconnaissance 
Surveillance
Justifications for Surveillance 
Advanced Persistent Threat 
Voice Surveillance 
Data Surveillance 
Large-Scale Surveillance Programs 
Uses of Surveillance Data 
Summary
Endnotes
Chapter 9 Computer Network Attack
Waging War in the Cyber Era
Physically 
Electronically 
Logically 
Reactively vs. Proactively 
Time as a Factor 
The Attack Process
Recon 
Scan 
Access 
Escalate 
Exfiltrate 
Assault 
Sustain 
Obfuscate 
Summary
Endnotes
Chapter 10 Computer Network Defense
What We Protect
Confidentiality, Integrity, Availability 
Authenticate, Authorize, and Audit 
Security Awareness and Training
Awareness 
Training 
Defending against Cyber Attacks
Policy and Compliance 
Surveillance, Data Mining, and Pattern Matching
Intrusion Detection and Prevention 
Vulnerability Assessment and Penetration Testing 
Disaster Recovery Planning 
Defense in Depth 
Summary
Endnotes
Chapter 11 Non-State Actors in Computer Network Operations
Individual Actors
Script Kiddies 
Malware Authors 
Scammers 
Blackhats 
Hacktivists 
Patriot Hackers 
Corporations
Motivation for Corporations to Act in Cyber Warfare 
Cyber Terrorism
Reasons for Cyber Terrorist Attacks 
What Will Happen When We See a Cyber Terrorist Attack?
Organized Cyber Crime
Motivations for Criminal Organizations 
Autonomous Actors
Exploratory Systems 
Attack Systems 
Defensive Systems 
Summary
Endnotes
Chapter 12 Legal System Impacts
Legal Systems
International 
United States Laws 
Criminal Law 
Key U.S. Laws
International Trafficking in Arms Regulations 
U.S. Cyber Related Laws 
Privacy Impacts
Electronic Communications Privacy Act 
Digital Forensics
Certification 
Summary
Endnotes
Chapter 13 Ethics
Ethics in Cyber Warfare
Use of Force 
Intent 
Secrecy 
Attribution 
Bellum Iustum (Just War Theory)
Jus ad Bellum (The Right to Wage War) 
Jus in Bello (Proper Conduct in War) 
Jus Post Bellum (Justice after War) 
Summary
Endnotes
Chapter 14 Cyberspace Challenges
Cybersecurity Issues Defined
Policy 
Processes 
Technical 
Skills 
People 
Organization 
Core (Impacting All Areas) 
Interrelationship of Cybersecurity Issues
Way Ahead
Summary
Endnotes
Chapter 15 The Future of Cyber War
Near Term Trends
Most Likely and Most Dangerous Courses of Action
New Technologies and New Problems
International Interactions
Summary
Endnotes
Appendix: Cyber Timeline
Index 


 Screenshot 
E-books Shop

Purchase Now !
Just with Paypal



Product details
 Price
 File Size
 2,990 KB
 Pages
 321 p
 File Type
 PDF format
 ISBN
 978-1-59749-637-7
 Copyright
 2011 Elsevier, Inc.            
●▬▬▬▬▬❂❂❂▬▬▬▬▬●
●▬▬❂❂▬▬●
●▬❂▬●


═════ ═════

Previous Post Next Post