Cyber warfare: techniques, tactics and tools for security practitioners
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Waltham, Mass. [u.a.]
Syngress
2011
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXVII, 289 S. Ill. |
ISBN: | 9781597496377 |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | BV039135632 | ||
003 | DE-604 | ||
005 | 20140206 | ||
007 | t | ||
008 | 110713s2011 a||| |||| 00||| eng d | ||
020 | |a 9781597496377 |c (pbk.) £24.99 |9 978-1-59749-637-7 | ||
035 | |a (OCoLC)745506056 | ||
035 | |a (DE-599)BSZ341272922 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
084 | |a PZ 4800 |0 (DE-625)141183: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 8 |2 ssgn | ||
100 | 1 | |a Andress, Jason |e Verfasser |0 (DE-588)101729996X |4 aut | |
245 | 1 | 0 | |a Cyber warfare |b techniques, tactics and tools for security practitioners |c Jason Andress ; Steve Winterfeld |
264 | 1 | |a Waltham, Mass. [u.a.] |b Syngress |c 2011 | |
300 | |a XXVII, 289 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
653 | |a Computer crimes | ||
653 | |a Information warfare | ||
653 | |a Computer crimes / Prevention | ||
655 | 7 | |8 1\p |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Winterfeld, Steve |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024153822&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024153822 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804147973151522816 |
---|---|
adam_text | Contents
Acknowledgments
......................................................................................................
v
About the Authors
....................................................................................................xv
About the Technical Editor
....................................................................................xvii
Foreword
.................................................................................................................xix
Introduction
...........................................................................................................xxiii
CHAPTER
1
What is Cyber Warfare?
...........................................................1
What is Cyber Warfare?
..................................................................1
Definition for Cyber Warfare
.....................................................2
Tactical and Operational Reasons for Cyber War
......................4
Cyber Strategy and Power
..........................................................5
Cyber Arms Control
...................................................................7
What is the United States Doing About the Threat of a
Cyber War?
.................................................................................9
Have We Seen a Cyber War?
........................................................12
Case Studies
.............................................................................13
The Debate (Is it Real?)
............................................................15
Why Cyber Warfare is Important
..................................................15
Summary
.......................................................................................16
Endnotes........................................................................................17
CHAPTER
2
The Cyberspace Battlefield
....................................................19
Boundaries in Cyber Warfare
........................................................19
Defense in Depth
......................................................................20
Physical Infrastructure
..............................................................21
Organizational View
.................................................................22
Where Cyber Fits in the War-fighting Domains
...........................26
Land
..........................................................................................26
Sea
............................................................................................27
Air
.............................................................................................27
Space
........................................................................................28
Cyber Domain
..........................................................................28
Threatscape
...................................................................................29
Most Active Threats
.................................................................29
Most Dangerous Threats
..........................................................30
Motivations
...............................................................................32
Fielding Systems at the Speed of Need
.........................................34
Summary
.......................................................................................35
Endnotes........................................................................................36
VII
VIII
Contents
CHAPTER
3
Cyber Doctrine
......................................................................37
Current U.S. Doctrine
...................................................................37
U.S.Forces...............................................................................39
U.S. Air Force
..........................................................................39
U.S. Navy
.................................................................................40
U.S. Army
................................................................................40
DoDINFOCONs
......................................................................41
Sample Doctrine/Strategy from Around the World
......................43
Chinese Doctrine
......................................................................43
Other Key Nations Developing Doctrine
.................................44
Translating Traditional Military Doctrine
.....................................46
IPOE
.........................................................................................46
JMEM
.......................................................................................47
MOE.........................................................................................47
BDA
.........................................................................................48
CAS
..........................................................................................48
COIN
........................................................................................48
Guidance and Directives
...............................................................49
CNCI
........................................................................................49
DHS
..........................................................................................49
HSPD
........................................................................................50
NIST
.........................................................................................52
Academia
and Industry Associations
.......................................53
Operations and Exercises
..............................................................54
Federal Exercises
......................................................................55
DoD Exercises
..........................................................................55
Educational Exercises
...............................................................56
Sample MESLs
.........................................................................56
Summary
.......................................................................................57
Endnotes........................................................................................57
CHAPTER
4
Cyber Warriors
.....................................................................61
What Does a Cyber Warrior Look Like?
......................................61
Certifications
............................................................................62
Education and Training
............................................................63
Experience and Skills
...............................................................64
Differences from Traditional Forces
.............................................66
Age
...........................................................................................66
Attitude
.....................................................................................66
Physical Condition
...................................................................67
Credentials
................................................................................68
Contents ix
Present
Cyber Warfare Forces......................................................69
U.S............................................................................................69
China........................................................................................71
Russia
.......................................................................................71
France.......................................................................................71
Israel.........................................................................................72
Brazil
........................................................................................72
Singapore..................................................................................
72
South Korea..............................................................................72
North
Korea..............................................................................73
Australia
...................................................................................73
Malaysia...................................................................................73
Japan.........................................................................................73
Canada
......................................................................................74
United Kingdom.......................................................................74
Other Countries with
Cyber Forces..........................................74
Corporate..................................................................................
74
Criminal
....................................................................................75
Staffing for
Cyber War..................................................................76
Sources of Talent
......................................................................76
Training the Next Generation
...................................................77
Summary
.......................................................................................80
Endnotes........................................................................................80
CHAPTER
5
Logical Weapons
..................................................................83
Reconnaissance Tools
...................................................................84
General Information Gathering
................................................85
Whois
.......................................................................................87
DNS
..........................................................................................88
Metadata
...................................................................................90
Maltego
.....................................................................................93
Defense
.....................................................................................94
Scanning Tools
..............................................................................94
Nmap
........................................................................................95
Nessus
.......................................................................................97
Defense
...................................................................................100
Access and Escalation Tools
.......................................................100
Password Tools
......................................................................101
The Metasploit Project
...........................................................102
Immunity CANVAS
...............................................................104
Defense
...................................................................................105
Contents
Exfiltration Tools........................................................................106
Physical
Exfiltration...............................................................106
Encryption and
Steganography..............................................107
Using Common Protocols
......................................................107
Out of Band Methods
.............................................................108
Defense
...................................................................................108
Sustainment Tools
.......................................................................109
Adding Authorized Access
.................................................109
Backdoors
...............................................................................109
Defense
...................................................................................110
Assault Tools
...............................................................................110
Meddling with Software
.........................................................110
Attacking Hardware
...............................................................112
Defense
...................................................................................113
Obfuscation Tools
.......................................................................113
Location Obscuration
.............................................................113
Log Manipulation
...................................................................114
File Manipulation
...................................................................115
Defense
...................................................................................116
Summary
.....................................................................................117
Endnotes......................................................................................118
CHAPTER
6
Physical Weapons
..............................................................119
How the Logical and Physical Realms are Connected
................120
Logical Systems Run on Physical Hardware
.........................120
Logical Attacks Can Have Physical Effects
...........................121
Infrastructure Concerns
...............................................................122
What is
SCADA?
...................................................................123
What Security Issues are Present in the World
of
SCADA?
............................................................................124
What are the Consequences of
SCADA
Failures?
.................125
Supply Chain Concerns
...............................................................126
Compromised Hardware
.........................................................126
Deliberately Corrupted Components
......................................127
Non-Technical Issues
.............................................................128
Tools for Physical Attack and Defense
.......................................128
Electromagnetic Attacks
.........................................................129
Covert Activity
.......................................................................132
Summary
.....................................................................................136
Endnotes......................................................................................137
Contents
XI
CHAPTER
7
Psychological Weapons
......................................................139
Social Engineering Explained
.....................................................139
Is Social Engineering Science?
..............................................140
SE
Tactics Techniques and Procedures (TTPs)
.....................140
Types of
SE
Approaches
........................................................142
Types of
SE
Methodologies
...................................................143
How the Military Approaches Social Engineering
.....................145
Army Doctrine
........................................................................146
How the Military Defends Against Social Engineering
..............149
How the Army does
CI
...........................................................151
An Air Force Approach
..........................................................151
Summary
.....................................................................................152
Endnotes......................................................................................152
CHAPTER
8
Computer Network Exploitation
............................................155
Intelligence and Counter-Intelligence
.........................................156
Sources of Cyber Attacks
.......................................................156
Attackers and Sponsors of Attacks
.........................................157
Reconnaissance
...........................................................................157
Open Source Intelligence
.......................................................157
Passive Reconnaissance
.........................................................159
Surveillance
.................................................................................161
Justifications for Surveillance
................................................161
Advanced Persistent Threat
....................................................162
Voice Surveillance
.................................................................163
Data Surveillance
...................................................................163
Large-Scale Surveillance Programs
.......................................164
Uses of Surveillance Data
......................................................165
Summary
.....................................................................................165
Endnotes......................................................................................166
CHAPTER
9
Computer Network Attack
....................................................167
Waging War in the Cyber Era
.....................................................168
Physically
...............................................................................168
Electronically
..........................................................................168
Logically
.................................................................................169
Reactively vs. Proactively
......................................................169
Time as a Factor
.....................................................................170
The Attack Process
......................................................................170
Recon
......................................................................................171
Scan
........................................................................................172
xii Contents
Access.....................................................................................173
Escalate...................................................................................
174
Exfiltrate
.................................................................................174
Assault
....................................................................................175
Sustain
....................................................................................177
Obfuscate
................................................................................177
Summary
.....................................................................................178
Endnotes......................................................................................178
CHAPTER
10
Computer Network Defense
.................................................179
What We Protect
.........................................................................180
Confidentiality, Integrity, Availability
...................................181
Authenticate, Authorize, and Audit
........................................182
Security Awareness and Training
...............................................183
Awareness
..............................................................................184
Training
..................................................................................185
Defending against Cyber Attacks
................................................185
Policy and Compliance
...........................................................186
Surveillance, Data Mining, and Pattern Matching
.................187
Intrusion Detection and Prevention
........................................187
Vulnerability Assessment and Penetration Testing
................188
Disaster Recovery Planning
...................................................188
Defense in Depth
....................................................................189
Summary
.....................................................................................190
Endnotes......................................................................................191
CHAPTER
11
Non-State Actors in Computer Network Operations
................193
Individual Actors
.........................................................................194
Script Kiddies
.........................................................................195
Malware
Authors
....................................................................195
Scammers
...............................................................................196
Blackhats
................................................................................196
Hacktivists
..............................................................................197
Patriot Hackers
.......................................................................197
Corporations
................................................................................197
Motivation for Corporations to Act in Cyber Warfare
...........198
Cyber Terrorism
..........................................................................198
Reasons for Cyber Terrorist Attacks
......................................199
What Will Happen When We See a Cyber Terrorist Attack?.
199
Organized Cyber Crime
..............................................................201
Motivations for Criminal Organizations
................................201
Contents xiii
Autonomous Actors
....................................................................202
Exploratory Systems
..............................................................202
Attack Systems
.......................................................................203
Defensive Systems
.................................................................204
Summary
.....................................................................................205
Endnotes......................................................................................206
CHAPTER
12
Legal System Impacts
.........................................................207
Legal Systems
.............................................................................209
International
............................................................................210
United States Laws
.................................................................211
Criminal Law
..........................................................................212
Key U.S. Laws
............................................................................213
International Trafficking in Arms Regulations
......................214
U.S. Cyber Related Laws
.......................................................214
Privacy Impacts
...........................................................................218
Electronic Communications Privacy Act
...............................218
Digital Forensics
.........................................................................219
Certification
............................................................................221
Summary
.....................................................................................222
Endnotes......................................................................................222
CHAPTER
13
Ethics
................................................................................225
Ethics in Cyber Warfare
..............................................................226
Use of Force
...........................................................................226
Intent
.......................................................................................227
Secrecy
...................................................................................227
Attribution
..............................................................................227
Military Ethics
........................................................................227
Bellům
lustum
(Just War Theory)
...............................................228
Jus
ad Bellům
(The Right to Wage War)
...............................230
Jus in
Bello
(Proper Conduct in War)
....................................232
Jus Post
Bellům
(Justice after War)
.......................................234
Summary
.....................................................................................235
Endnotes......................................................................................236
CHAPTER
14
Cyberspace Challenges
.......................................................239
Cybersecurity Issues Defined
......................................................240
Policy
......................................................................................241
Processes
................................................................................242
Technical
................................................................................243
xiv Contents
Skills
.......................................................................................247
People
.....................................................................................247
Organization
...........................................................................249
Core (Impacting All Areas)
....................................................249
Interrelationship of Cybersecurity Issues
....................................252
Way Ahead
..................................................................................254
Summary
.....................................................................................255
Endnotes......................................................................................256
CHAPTER
15
The Future of Cyber War
......................................................257
Near Term Trends
.......................................................................263
Most Likely and Most Dangerous Courses of Action
.................266
New Technologies and New Problems
.......................................268
International Interactions
............................................................270
Summary
.....................................................................................271
Endnotes......................................................................................271
Appendix: Cyber Timeline
............................................................................273
Index
..........................................................................................................277
|
any_adam_object | 1 |
author | Andress, Jason Winterfeld, Steve |
author_GND | (DE-588)101729996X |
author_facet | Andress, Jason Winterfeld, Steve |
author_role | aut aut |
author_sort | Andress, Jason |
author_variant | j a ja s w sw |
building | Verbundindex |
bvnumber | BV039135632 |
classification_rvk | PZ 4800 ST 277 |
ctrlnum | (OCoLC)745506056 (DE-599)BSZ341272922 |
discipline | Rechtswissenschaft Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01628nam a22004092c 4500</leader><controlfield tag="001">BV039135632</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140206 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110713s2011 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496377</subfield><subfield code="c">(pbk.) £24.99</subfield><subfield code="9">978-1-59749-637-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)745506056</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ341272922</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4800</subfield><subfield code="0">(DE-625)141183:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)101729996X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare</subfield><subfield code="b">techniques, tactics and tools for security practitioners</subfield><subfield code="c">Jason Andress ; Steve Winterfeld</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Mass. [u.a.]</subfield><subfield code="b">Syngress</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVII, 289 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer crimes</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information warfare</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Winterfeld, Steve</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024153822&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024153822</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV039135632 |
illustrated | Illustrated |
indexdate | 2024-07-09T23:59:44Z |
institution | BVB |
isbn | 9781597496377 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024153822 |
oclc_num | 745506056 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XXVII, 289 S. Ill. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Andress, Jason Verfasser (DE-588)101729996X aut Cyber warfare techniques, tactics and tools for security practitioners Jason Andress ; Steve Winterfeld Waltham, Mass. [u.a.] Syngress 2011 XXVII, 289 S. Ill. txt rdacontent n rdamedia nc rdacarrier Information warfare (DE-588)4461975-3 gnd rswk-swf Computer crimes Information warfare Computer crimes / Prevention 1\p (DE-588)4151278-9 Einführung gnd-content Information warfare (DE-588)4461975-3 s DE-604 Winterfeld, Steve Verfasser aut Digitalisierung BSB Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024153822&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Andress, Jason Winterfeld, Steve Cyber warfare techniques, tactics and tools for security practitioners Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4151278-9 |
title | Cyber warfare techniques, tactics and tools for security practitioners |
title_auth | Cyber warfare techniques, tactics and tools for security practitioners |
title_exact_search | Cyber warfare techniques, tactics and tools for security practitioners |
title_full | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress ; Steve Winterfeld |
title_fullStr | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress ; Steve Winterfeld |
title_full_unstemmed | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress ; Steve Winterfeld |
title_short | Cyber warfare |
title_sort | cyber warfare techniques tactics and tools for security practitioners |
title_sub | techniques, tactics and tools for security practitioners |
topic | Information warfare (DE-588)4461975-3 gnd |
topic_facet | Information warfare Einführung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024153822&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT andressjason cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners AT winterfeldsteve cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners |