Amazon cover image
Image from Amazon.com

Cyberwarfare : an introduction to information-age conflict / Isaac R. Porche.

By: Material type: TextTextSeries: Artech House intelligence and information operations seriesPublisher: Norwood, MA : Artech House, [2020]Copyright date: ©2020Description: 1 online resource (xxi, 353 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781630815783
  • 1630815780
Subject(s): Genre/Form: Additional physical formats: Print version:: Cyberwarfare.DDC classification:
  • 005.8 23
LOC classification:
  • HV6773.15.C97
Online resources:
Contents:
1. Information and conflict -- 2. Cyberattack lifecycles -- 3. Cyber risk -- 4. Legal aspects of cyber warfare and IW -- 5. Digital and wireless communication -- 6. Introduction to networking -- 7. Networking technology : ethernet, wi-fi, and bluetooth -- 8. Introduction to internet protocol and IP addresses -- 9. The transport layer, the application layer, the internet and the web -- 10. Offensive cyber operations by nation-state actors -- 11. Offensive cyber operations : techniques, procedures, and tools -- 12. Cybersecurity and the maritime domain -- 13. The cybersecurity of U.S. election systems.
Summary: Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.-- Provided by publisher.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Includes bibliographical references and index

1. Information and conflict -- 2. Cyberattack lifecycles -- 3. Cyber risk -- 4. Legal aspects of cyber warfare and IW -- 5. Digital and wireless communication -- 6. Introduction to networking -- 7. Networking technology : ethernet, wi-fi, and bluetooth -- 8. Introduction to internet protocol and IP addresses -- 9. The transport layer, the application layer, the internet and the web -- 10. Offensive cyber operations by nation-state actors -- 11. Offensive cyber operations : techniques, procedures, and tools -- 12. Cybersecurity and the maritime domain -- 13. The cybersecurity of U.S. election systems.

Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.-- Provided by publisher.

Isaac R. Porche, III is a chief engineer at a large defense contractor. He was formerly a senior engineer at the RAND Corporation, where he served as the Director of the Acquisition and Development Program in the Homeland Security Operational Analysis Center. He is a former member of the U.S. Army Science Board and is currently an adjunct instructor for Carnegie Mellon University's Institute for Politics and Strategy. He has testified before Congress on the topic of cyber threats and he once led a congressionally mandated study on cybersecurity needs of the legislative branch. He received his Ph. D. in electrical engineering and computer science from The University of Michigan.

Print version record.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library