Waging Cyber War
- Author: Jacob G. Oakley
- ISBN: 1484249496
- Year: 2019
- Pages: 192
- Language: English
- File size: 2.9 MB
- File format: PDF, ePub
- Category: Security
Understand the challenges of implementing a cyber warfare plan and conducting cyber warfare. This publication addresses the knowledge gaps and misconceptions about what it takes to wage cyber warfare in the technical perspective of those with their hands on the keyboard.
You will soon appreciate the problem and complexity of executing warfare inside the cyber domain. Included is a comprehensive illustration of cyber warfare against the background of national and international coverage, laws, and traditions regarding war.
Waging Cyber War details technical resources and actions required by the cyber war fighter. Even non-technical readers will acquire an comprehension of the way the challenges encountered are not easily mitigated and the irreplaceable character of many cyber resources.
You may walk away more informed on how warfare is conducted from a cyber perspective, and perhaps why it should not be waged. And you will come to learn how cyber warfare has been covered unrealistically, publicly misrepresented, and misunderstood by many.
What You Will Learn
- Understand the concept of warfare and the way that cyber matches into the war-fighting domain
- Know what constitutes and is involved in defining war and warfare in Addition to how cyber fits in that paradigm and vice versa
- Discover how the policies being put in place to plan and conduct cyber warfare reflect a lack of comprehension regarding the technical means and resources required to execute such actions
- Know what it means to do cyber exploitation, attack, and intelligence gathering; when one is favored over another; and their specific values and influences on every other
- Be more Knowledgeable about the requirement for, and challenges of, enemy attribution
- Realize how to develop and scope a goal in cyber warfare
- Grasp the Idea of self-attribution: what it is, the need to prevent it, and its impact
- Watch what goes into creating the accessibility from which you may conduct cyber warfare against an identified goal
- Appreciate how institution affects cyber warfare
- Recognize the need for resource resilience, management, and ownership
- Walk through the myths as well as an illustrative analogy of why cyber warfare doesn’t necessarily work as it is prescribed
Who This Book Is For
Anyone curious about warfare in the era of cyber everything, people involved with cyber operations and cyber warfare, and security practitioners and policy or decision makers. The book is also for anyone with a mobile phone, smart refrigerator, or other computing device since you are a part of the attack surface.