The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

دانلود کتاب The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

51000 تومان موجود

کتاب مبانی جنگ سایبری: درک مبانی جنگ سایبری در تئوری و عمل نسخه زبان اصلی

دانلود کتاب مبانی جنگ سایبری: درک مبانی جنگ سایبری در تئوری و عمل بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 5


توضیحاتی در مورد کتاب The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

نام کتاب : The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
ویرایش : 1°
عنوان ترجمه شده به فارسی : مبانی جنگ سایبری: درک مبانی جنگ سایبری در تئوری و عمل
سری :
نویسندگان :
ناشر : Syngress
سال نشر : 2012
تعداد صفحات : 169
ISBN (شابک) : 0124047378 , 9780124047372
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 8 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Front Cover
Half Title
Title page
Copyright
Dedication
Contents
Author Biography
Introduction
1 Cyber Threatscape
How Did We Get Here?
Attack Methodology Plus Tools/Techniques Used
Attackers (The Types of Threats)
How Most Organizations Defend Today (Defensive Mountain Range)?
Targeted Capabilities (What We Should be Defending)
Summary
References
2 Cyberspace Battlefield Operations
What is Cyber Warfare?
Definition for Cyber Warfare
Tactical and Operational Reasons for Cyber War
Cyber Strategy and Power
Cyber Arms Control
Cyber War—Hype or Reality
Boundaries in Cyber Warfare
Defense in Depth
Computer Controlled Infrastructure
Organizational View
Where Cyber Fits in the War-Fighting Domains
Land
Sea
Air
Space
Cyber Domain
Summary
References
3 Cyber Doctrine
Current US Doctrine
US Forces
US Air Force
US Navy
US Army
DoD INFOCONs
Sample Doctrine / Strategy From Around the World
Chinese Doctrine
Other Asian countries
European Countries
Private or Mercenary Armies
Some Key Military Principles that Must be Adapted to Cyber Warfare
Intelligence Preparation of the Operational Environment (IPOE)
Joint Munitions Effectiveness Manual (JMEM)
Measures of Effectiveness (MOE)
Battle Damage Assessment (BDA)
Close Air Support (CAS)
Counterinsurgency (COIN)
Summary
References
4 Tools and Techniques
Logical Weapons
Reconnaissance Tools
Scanning Tools
Access and Escalation Tools
Exfiltration Tools
Sustainment Tools
Assault Tools
Obfuscation Tools
Physical Weapons
How the Logical and Physical Realms are Connected
Logical Systems Run on Physical Hardware
Logical Attacks Can Have Physical Effects
Infrastructure Concerns
What is SCADA?
What Security Issues are Present in the World of SCADA?
What are the Consequences of SCADA Failures?
Supply Chain Concerns
Compromised Hardware
Deliberately Corrupted Components
Non-Technical Issues
Tools for Physical Attack and Defense
Electromagnetic Attacks
Electromagnetic Pulse (EMP) Weapons
Jamming
Defense Against Conventional Attacks
Summary
References
5 Offensive Tactics and Procedures
Computer Network Exploitation
Intelligence and Counter-Intelligence
Reconnaissance
Open Source Intelligence
Passive Reconnaissance
Surveillance
Voice Surveillance
Data Surveillance
Large Scale Surveillance Programs
Uses of Surveillance Data
Computer Network Attack
Waging War in the Cyber Era
Physical Warfare
Electronic Warfare
Logical Warfare
Reactive vs Proactive Attacks
The Attack Process
Recon
Scan
Access
Escalate
Exfiltrate
Assault
Sustain
Obfuscate
Summary
References
6 Psychological Weapons
Social Engineering Explained
Is Social Engineering science?
SE Tactics Techniques and Procedures (TTPs)
Types of SE approaches
Types of SE methodologies
How the Military Approaches Social Engineering
Army Doctrine
How the Military Defends against Social Engineering
How the Army Does CI
An Air Force Approach
Summary
References
7 Defensive Tactics and Procedures
What We Protect
Confidentiality, Integrity, Availability (CIA)
Authenticate, Authorize, and Audit
Security Awareness and Training
Awareness
Training
Defending Against Cyber Attacks
Policy and Compliance
Surveillance, Data Mining, and Pattern Matching
Intrusion Detection and Prevention
Vulnerability Assessment and Penetration Testing
Disaster Recovery Planning
Defense in Depth
Summary
References
8 Challenges We Face
Cybersecurity Issues defined
Policy
Processes
Technical
Skills
People
Organization
Core (Impacting All Areas)
Interrelationship of Cybersecurity Issues
Way Ahead
Summary
References
9 Where is Cyber Warfare Headed?
Technology-Based Trends
Policy-Based Trends
How to Defend in Today’s Contested Virtual Environment
Summary
References
Index




پست ها تصادفی