Cyber Operations (eBook)

A Case Study Approach
eBook Download: PDF
2024 | 1. Auflage
320 Seiten
Wiley (Verlag)
978-1-119-71210-7 (ISBN)

Lese- und Medienproben

Cyber Operations -  Jerry M. Couretas
Systemvoraussetzungen
111,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations. Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed. Cyber Operations readers will also find: Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure Insight from an author with top-level experience in cyber security Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.

Jerry M. Couretas, PhD, is Lead Associate for Booz Allen Hamilton and manages the Cyber Mission Modeling project for the United States Office of the Secretary of Defense (OSD). He is also the Editor-in-Chief of the Journal of Defense Modeling and Simulation.

Preface xiii

Section I Cyber Operations Introduction 1

I.1 Phases of Cyber Operations 3

1 Cyber Operations 9

1.1 Cyber Operations Introduction 9

1.2 Early Internet and Cyber Operations 15

1.3 Cyber Operations' Stage Descriptions 18

1.4 Cyber Operations Wrap-up 22

2 ISIS and Web-Based Insurgency 27

2.1 Introduction 27

2.2 Cyber-Based Irregular Operations 30

2.3 ISIS and Web-Based Insurgency Wrap-up 31

3 Cyber and Crime 37

3.1 Cyber and Crime 37

4 Nation-State Cyber Operations 61

4.1 Nation State Cyber Operations 61

5 Russian Cyber Operations 75

5.1 Russian Cyber Operations 75

6 Chinese Cyber Operations 99

6.1 Chinese Cyber Operations 99

7 DPRK Cyber Operations 117

7.1 DPRK Cyber Operations 117

8 Iranian Cyber Operations 133

8.1 Iranian Cyber Operations 133

9 Independent Cyber Operators 155

9.1 Independent Cyber Operations 155

Section I Cyber Operations Summary 169

I.1 Introduction 169

I.2 Phases of Cyber Operations 171

Section II Introduction to Cyber Effects 177

II.1 Cyber Effects Introduction 177

II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects 177

II.1.2 Wrap-up 178

10 Strategic Cyber Effects 181

10.1 Strategic Cyber Effects 181

11 Strategic Cyber Effects (2) 185

11.1 Critical Infrastructure Strategic Cyber Effects 185

12 Tactical Cyber Effects 195

12.1 Cyber Tactical Effects 195

13 Cyber Crime Effects 205

13.1 Criminal Cyber Effects 205

Section II Cyber Effects Conclusions 219

II.1 Cyber Effects Overview 219

II.2 Cyber Effects' Wrap-up 220

Section III Cyberspace Environment and Tools Introduction 223

14 Criminal Cyber Operations and Tools 227

14.1 Criminal Cyber Operations and Tools 227

15 Russian Cyber Operations and Tools 239

15.1 Russian Cyber Operations and Tools 239

16 Iran, China, and DPRK Cyber Operations and Tools 251

16.1 China, DPRK, and Iran Cyber Operations and Tools 251

17 Strategic Cyber Technologies -- ICS/SCADA, Election Machines, and Crypto Currencies 261

17.1 Strategic Cyber Technologies 261

18 Cyber Case Studies Conclusion 271

Section III Cyberspace Environment and Tools Conclusion 275

III.A Appendix I -- Tool Examples 278

Bibliography 278

CCS Glossary 281

Index 295

Erscheint lt. Verlag 8.4.2024
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Schlagworte Betriebswirtschaft • Betriebswirtschaft u. Operationsforschung • Business & Management • Computer Science • Computer Security & Cryptography • Computersicherheit • Computersicherheit u. Kryptographie • Informatik • Management Science/Operational Research • Risiko-, Notfall- u. Krisenmanagement • Risk, Contingency & Crisis Management • Wirtschaft u. Management
ISBN-10 1-119-71210-6 / 1119712106
ISBN-13 978-1-119-71210-7 / 9781119712107
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 4,2 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Jeff Mar; Peter Armaly

eBook Download (2024)
Packt Publishing (Verlag)
25,19