Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.

Key Features

  • Define and determine a cyber-defence strategy based on current and past real-life examples
  • Understand how future technologies will impact cyber warfare campaigns and society
  • Future-ready yourself and your business against any cyber threat

Book Description

The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media.

Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light.

The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario.

Cyber Warfare – Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data.

What you will learn

  • Hacking at scale – how machine learning (ML) and artificial intelligence (AI) skew the battlefield
  • Defending a boundaryless enterprise
  • Using video and audio as weapons of influence
  • Uncovering DeepFakes and their associated attack vectors
  • Using voice augmentation for exploitation
  • Defending when there is no perimeter
  • Responding tactically to counter-campaign-based attacks

Who this book is for

This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Table of Contents

  1. A Brief History of Cyber Threats and the Emergence of the APT Designator
  2. The Perimeter Is Dead
  3. Emerging Tactics and Trends – What Is Coming?
  4. Influence Attacks – Using Social Media Platforms for Malicious Purposes
  5. DeepFakes and AI/ML in Cyber Security
  6. Advanced Campaigns in Cyber Warfare
  7. Strategic Planning for Future Cyber Warfare
  8. Cyber Warfare Strategic Innovations and Force Multipliers
  9. Bracing for Impact
  10. Survivability in Cyber Warfare and Potential Impacts for Failure

Author(s): Dr. Chase Cunningham
Publisher: Packt Publishing
Year: 2020

Language: English
Pages: 330

Cover
Copyright
Packt Page
Contributors
Table of Contents
Preface
Chapter 1: A Brief History of Cyber Threats and the Emergence of the APT Designator
Hackers aren't what Hollywood shows us
The Battle of the Beams
Modem hacks
Anti-virus growth
The dawn of Advanced Persistent Threats (APTs)
Early APT attacks
Confusion in cyber defense
US and allied cyber defense establishment
The cyber shot heard round the world
Tit-for-Tat cyber warfare
Pandora's box busts open
Conclusion
References
Chapter 2: The Perimeter Is Dead
A scenario detailing holes in the model
A global perimeter falls
Even compliant organizations' perimeters fail
Governments' perimeters fail
Users, BYOD, and the obliteration of the perimeter
Applications add to insecurity
Authentication methods failed
IoT devices poke holes in any perimeter
You can't fix stupid, or evil
Conclusion
References
Chapter 3: Emerging Tactics and Trends – What Is Coming?
Attacks move downstream
Autonomous vehicles…Bad data, bad day
Drones…Death from above
Threat actors combine tactics to optimize attack effectiveness
Ransomware goes mobile
DDoS reaches weapons-grade refinement
Conclusion
References
Chapter 4: Influence Attacks – Using Social Media Platforms for Malicious Purposes
The new cyber onslaught
Cyber combat is changing
#Hashtag or ammunition?
Influencing the influencers
Conclusion
References
Chapter 5: DeepFakes and AI/ML in Cyber Security
From big screen to smartphone – the dawn of DeepFakes
Defining DeepFakes
GANs power DeepFakes
Applied DeepFakes, AKA DeepMastersPrints
Hacking voice using ML, AKA DeepVoice
ReadFakes
Breaking news may mean breaking bad
When data and AI "studies" go awry
Conclusion
References
Chapter 6: Advanced Campaigns in Cyber Warfare
Cyber warfare campaigns
Indian Nuclear Plant campaign
Chinese manufacturing campaign
The US and Libya election interference campaign
False flags corrupt campaign attribution in cyberspace
Mapping campaigns to matrices
Threat groups avoid attribution intentionally
Modifying command and control for confusion
Naming the beast
Sometimes it doesn't add up
Chaos is the goal
Cyber attack campaigns for the coming decade
Hoaxing
Conclusion
Chapter 7: Strategic Planning for Future Cyber Warfare
Everyone has a plan until they get punched in the mouth
What type of strategy?
When the nature of combat demands a change in strategy
Infiltration does not equal dominance
Leaders need to have their "boots on the ground"
The environment determines what works, not the equipment
Intelligence and "Intel" may not be the same thing
Too much may be too much
Big walls can mean big problems
The mission was not accomplished…
What does an effective strategy in cyberspace look like?
Changing strategic concepts
Strategically defending the "Edge"
Eat the elephant
The orchestration enables the strategy
Conclusion
Chapter 8: Cyber Warfare Strategic Innovations and Force Multipliers
Defensive tooling and strategic enablers
Meet the Monkey
More offerings from the Infection Monkey
Advanced uses of the Infection Monkey
The Software-Defined Perimeter
Application whitelisting
Offensive tooling and strategic enablers
Why kill the password?
WhatBreach
SNAP_R
Running the SNAP_R attack (sample commands)
Comment faking for influence
Conclusion
References
Chapter 9: Bracing for Impact
Disclaimer
Micro-segmentation is a key to survival
What is micro-segmentation?
Micro-segmentation tools and technologies
A pragmatic application for SDN
Possible pitfalls in micro-segmentation
Reclaiming the "high ground"
Kill the password, limit the pain
Intelligence collection
Conclusion
References
Chapter 10: Survivability in Cyber Warfare and Potential Impacts for Failure
What good are laws in war?
"Law 1" – Default means dead
"Law 2" – Think strategically, move tactically
"Law 3" – Details, details
"Law 4" – Kill the password
"Law 5" – Limit the blast radius
Impact from failure
Compromising healthcare
Bringing down ICS (Industrial Control Systems)
Threatening the fates of nations
Threat scenario – Deepfakes
Threat Scenario – Data manipulation
Threat Scenario – Attacking democratic processes
Conclusion
Appendix – Major cyber incidents throughout 2019
Other Books You May Enjoy
Index