Cyber Operations
-15%
portes grátis
Cyber Operations
A Case Study Approach
Couretas, Jerry M.
John Wiley & Sons Inc
03/2024
320
Dura
Inglês
9781119712091
15 a 20 dias
Descrição não disponível.
Preface xiii
Section I Cyber Operations Introduction 1
I.1 Phases of Cyber Operations 3
1 Cyber Operations 9
1.1 Cyber Operations Introduction 9
1.2 Early Internet and Cyber Operations 15
1.3 Cyber Operations' Stage Descriptions 18
1.4 Cyber Operations Wrap-up 22
2 ISIS and Web-Based Insurgency 27
2.1 Introduction 27
2.2 Cyber-Based Irregular Operations 30
2.3 ISIS and Web-Based Insurgency Wrap-up 31
3 Cyber and Crime 37
3.1 Cyber and Crime 37
4 Nation-State Cyber Operations 61
4.1 Nation State Cyber Operations 61
5 Russian Cyber Operations 75
5.1 Russian Cyber Operations 75
6 Chinese Cyber Operations 99
6.1 Chinese Cyber Operations 99
7 DPRK Cyber Operations 117
7.1 DPRK Cyber Operations 117
8 Iranian Cyber Operations 133
8.1 Iranian Cyber Operations 133
9 Independent Cyber Operators 155
9.1 Independent Cyber Operations 155
Section I Cyber Operations Summary 169
I.1 Introduction 169
I.2 Phases of Cyber Operations 171
Section II Introduction to Cyber Effects 177
II.1 Cyber Effects Introduction 177
II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects 177
II.1.2 Wrap-up 178
10 Strategic Cyber Effects 181
10.1 Strategic Cyber Effects 181
11 Strategic Cyber Effects (2) 185
11.1 Critical Infrastructure Strategic Cyber Effects 185
12 Tactical Cyber Effects 195
12.1 Cyber Tactical Effects 195
13 Cyber Crime Effects 205
13.1 Criminal Cyber Effects 205
Section II Cyber Effects Conclusions 219
II.1 Cyber Effects Overview 219
II.2 Cyber Effects' Wrap-up 220
Section III Cyberspace Environment and Tools Introduction 223
14 Criminal Cyber Operations and Tools 227
14.1 Criminal Cyber Operations and Tools 227
15 Russian Cyber Operations and Tools 239
15.1 Russian Cyber Operations and Tools 239
16 Iran, China, and DPRK Cyber Operations and Tools 251
16.1 China, DPRK, and Iran Cyber Operations and Tools 251
17 Strategic Cyber Technologies -- ICS/SCADA, Election Machines, and Crypto Currencies 261
17.1 Strategic Cyber Technologies 261
18 Cyber Case Studies Conclusion 271
Section III Cyberspace Environment and Tools Conclusion 275
III.A Appendix I -- Tool Examples 278
Bibliography 278
CCS Glossary 281
Index 295
Section I Cyber Operations Introduction 1
I.1 Phases of Cyber Operations 3
1 Cyber Operations 9
1.1 Cyber Operations Introduction 9
1.2 Early Internet and Cyber Operations 15
1.3 Cyber Operations' Stage Descriptions 18
1.4 Cyber Operations Wrap-up 22
2 ISIS and Web-Based Insurgency 27
2.1 Introduction 27
2.2 Cyber-Based Irregular Operations 30
2.3 ISIS and Web-Based Insurgency Wrap-up 31
3 Cyber and Crime 37
3.1 Cyber and Crime 37
4 Nation-State Cyber Operations 61
4.1 Nation State Cyber Operations 61
5 Russian Cyber Operations 75
5.1 Russian Cyber Operations 75
6 Chinese Cyber Operations 99
6.1 Chinese Cyber Operations 99
7 DPRK Cyber Operations 117
7.1 DPRK Cyber Operations 117
8 Iranian Cyber Operations 133
8.1 Iranian Cyber Operations 133
9 Independent Cyber Operators 155
9.1 Independent Cyber Operations 155
Section I Cyber Operations Summary 169
I.1 Introduction 169
I.2 Phases of Cyber Operations 171
Section II Introduction to Cyber Effects 177
II.1 Cyber Effects Introduction 177
II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects 177
II.1.2 Wrap-up 178
10 Strategic Cyber Effects 181
10.1 Strategic Cyber Effects 181
11 Strategic Cyber Effects (2) 185
11.1 Critical Infrastructure Strategic Cyber Effects 185
12 Tactical Cyber Effects 195
12.1 Cyber Tactical Effects 195
13 Cyber Crime Effects 205
13.1 Criminal Cyber Effects 205
Section II Cyber Effects Conclusions 219
II.1 Cyber Effects Overview 219
II.2 Cyber Effects' Wrap-up 220
Section III Cyberspace Environment and Tools Introduction 223
14 Criminal Cyber Operations and Tools 227
14.1 Criminal Cyber Operations and Tools 227
15 Russian Cyber Operations and Tools 239
15.1 Russian Cyber Operations and Tools 239
16 Iran, China, and DPRK Cyber Operations and Tools 251
16.1 China, DPRK, and Iran Cyber Operations and Tools 251
17 Strategic Cyber Technologies -- ICS/SCADA, Election Machines, and Crypto Currencies 261
17.1 Strategic Cyber Technologies 261
18 Cyber Case Studies Conclusion 271
Section III Cyberspace Environment and Tools Conclusion 275
III.A Appendix I -- Tool Examples 278
Bibliography 278
CCS Glossary 281
Index 295
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Cyber security; cyber attacks; cyber threats; availability attacks; Internet of Things; cyber interfaces; automated transportation; voice activated search; security policy; 2016 US Presidential Election; Dragonfly Campaign
Preface xiii
Section I Cyber Operations Introduction 1
I.1 Phases of Cyber Operations 3
1 Cyber Operations 9
1.1 Cyber Operations Introduction 9
1.2 Early Internet and Cyber Operations 15
1.3 Cyber Operations' Stage Descriptions 18
1.4 Cyber Operations Wrap-up 22
2 ISIS and Web-Based Insurgency 27
2.1 Introduction 27
2.2 Cyber-Based Irregular Operations 30
2.3 ISIS and Web-Based Insurgency Wrap-up 31
3 Cyber and Crime 37
3.1 Cyber and Crime 37
4 Nation-State Cyber Operations 61
4.1 Nation State Cyber Operations 61
5 Russian Cyber Operations 75
5.1 Russian Cyber Operations 75
6 Chinese Cyber Operations 99
6.1 Chinese Cyber Operations 99
7 DPRK Cyber Operations 117
7.1 DPRK Cyber Operations 117
8 Iranian Cyber Operations 133
8.1 Iranian Cyber Operations 133
9 Independent Cyber Operators 155
9.1 Independent Cyber Operations 155
Section I Cyber Operations Summary 169
I.1 Introduction 169
I.2 Phases of Cyber Operations 171
Section II Introduction to Cyber Effects 177
II.1 Cyber Effects Introduction 177
II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects 177
II.1.2 Wrap-up 178
10 Strategic Cyber Effects 181
10.1 Strategic Cyber Effects 181
11 Strategic Cyber Effects (2) 185
11.1 Critical Infrastructure Strategic Cyber Effects 185
12 Tactical Cyber Effects 195
12.1 Cyber Tactical Effects 195
13 Cyber Crime Effects 205
13.1 Criminal Cyber Effects 205
Section II Cyber Effects Conclusions 219
II.1 Cyber Effects Overview 219
II.2 Cyber Effects' Wrap-up 220
Section III Cyberspace Environment and Tools Introduction 223
14 Criminal Cyber Operations and Tools 227
14.1 Criminal Cyber Operations and Tools 227
15 Russian Cyber Operations and Tools 239
15.1 Russian Cyber Operations and Tools 239
16 Iran, China, and DPRK Cyber Operations and Tools 251
16.1 China, DPRK, and Iran Cyber Operations and Tools 251
17 Strategic Cyber Technologies -- ICS/SCADA, Election Machines, and Crypto Currencies 261
17.1 Strategic Cyber Technologies 261
18 Cyber Case Studies Conclusion 271
Section III Cyberspace Environment and Tools Conclusion 275
III.A Appendix I -- Tool Examples 278
Bibliography 278
CCS Glossary 281
Index 295
Section I Cyber Operations Introduction 1
I.1 Phases of Cyber Operations 3
1 Cyber Operations 9
1.1 Cyber Operations Introduction 9
1.2 Early Internet and Cyber Operations 15
1.3 Cyber Operations' Stage Descriptions 18
1.4 Cyber Operations Wrap-up 22
2 ISIS and Web-Based Insurgency 27
2.1 Introduction 27
2.2 Cyber-Based Irregular Operations 30
2.3 ISIS and Web-Based Insurgency Wrap-up 31
3 Cyber and Crime 37
3.1 Cyber and Crime 37
4 Nation-State Cyber Operations 61
4.1 Nation State Cyber Operations 61
5 Russian Cyber Operations 75
5.1 Russian Cyber Operations 75
6 Chinese Cyber Operations 99
6.1 Chinese Cyber Operations 99
7 DPRK Cyber Operations 117
7.1 DPRK Cyber Operations 117
8 Iranian Cyber Operations 133
8.1 Iranian Cyber Operations 133
9 Independent Cyber Operators 155
9.1 Independent Cyber Operations 155
Section I Cyber Operations Summary 169
I.1 Introduction 169
I.2 Phases of Cyber Operations 171
Section II Introduction to Cyber Effects 177
II.1 Cyber Effects Introduction 177
II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects 177
II.1.2 Wrap-up 178
10 Strategic Cyber Effects 181
10.1 Strategic Cyber Effects 181
11 Strategic Cyber Effects (2) 185
11.1 Critical Infrastructure Strategic Cyber Effects 185
12 Tactical Cyber Effects 195
12.1 Cyber Tactical Effects 195
13 Cyber Crime Effects 205
13.1 Criminal Cyber Effects 205
Section II Cyber Effects Conclusions 219
II.1 Cyber Effects Overview 219
II.2 Cyber Effects' Wrap-up 220
Section III Cyberspace Environment and Tools Introduction 223
14 Criminal Cyber Operations and Tools 227
14.1 Criminal Cyber Operations and Tools 227
15 Russian Cyber Operations and Tools 239
15.1 Russian Cyber Operations and Tools 239
16 Iran, China, and DPRK Cyber Operations and Tools 251
16.1 China, DPRK, and Iran Cyber Operations and Tools 251
17 Strategic Cyber Technologies -- ICS/SCADA, Election Machines, and Crypto Currencies 261
17.1 Strategic Cyber Technologies 261
18 Cyber Case Studies Conclusion 271
Section III Cyberspace Environment and Tools Conclusion 275
III.A Appendix I -- Tool Examples 278
Bibliography 278
CCS Glossary 281
Index 295
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.