This book is for all those cyber security professionals who seek to know the truth behind the history of cyber warfare and are working to secure their infrastructure and personnel for the future. The aim of this book is to cover the topics around cyber warfare tools, tactics, and strategies.
This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field. In particular, CISOs, cyber security leadership, blue team personnel, red team operators, strategic defense planners, executives in cyber security, and cyber security operations personnel should benefit from the insights and perspectives offered in this book.
Chapter 1: A Brief History of Cyber Threats and the Emergence of the APT Designator – This chapter will dive into the real history of cyber threats and their emergence in the space and provide some background on nation state APT designations.
Chapter 2: The Perimeter Is Dead – In this chapter, we'll go through all the intricacies and details that prove that the perimeter-based model of security failed years ago.
Chapter 3: Emerging Tactics and Trends – What Is Coming? – This chapter will be a journey down the rabbit hole into the future of cyber warfare tools and tactics and will provide examples of the new trends in this ever evolving space.
Chapter 4: Influence Attacks – Using Social Media Platforms for Malicious Purposes – In this chapter, we will cover the ways in which social media and influence can be weaponized for cyber warfare tactics.
Chapter 5: DeepFakes and AI/ML in Cyber Security – In this chapter, you will learn about the reality of AI and ML in cyber security and delve into the practical applications of these often-misunderstood technologies.
Chapter 6: Advanced Campaigns in Cyber Warfare – In this chapter, we will get into the types of attack campaigns and their real-world implications.
Chapter 7: Strategic Planning for Future Cyber Warfare – In this chapter, we will break down the specifics around how to better plan for cyber warfare and why strategy matters in digital combat.
Chapter 8: Cyber Warfare Strategic Innovations and Force Multipliers – This chapter is going to provide specific examples of what tools and technologies there are on the market that can help exponentially increase an organizations defensive posture.
Chapter 9: Bracing for Impact – In this chapter, you will be offered examples of how to apply tooling, tactics, and strategies to brace for the impact of a cyber attack and ways in which your organization can better respond when things go awry.
Chapter 10: Survivability in Cyber Warfare and Potential Impacts for Failure – In this chapter, we will cover essential ideas for defensive strategic planning and provide real-world examples of what may happen when cyber warfare tactics go big.
Appendix: Major Cyber Incidents Throughout 2019 – A list of recent major cyber incidents throughout 2019, categorized by the class of attack, as presented in Chapter 6.
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. You can download it here: https://static.packt-cdn.com/downloads/9781839216992_ColorImages.pdf.
CodeInText
: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. For example: "Changeme.py
focuses on detecting default and backdoor credentials, and not just common account credentials."
Bold: Indicates a new term, an important word, or words that you see on the screen, for example, in menus or dialog boxes, also appear in the text like this. For example: "The first, and arguably most important, technology is commonly called Software-Defined Networking (SDN)."
Feedback from our readers is always welcome.
General feedback: If you have questions about any aspect of this book, mention the book title in the subject of your message and email us at [email protected]
.
Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book we would be grateful if you would report this to us. Please visit, http://www.packt.com/submit-errata, selecting your book, clicking on the Errata Submission Form link, and entering the details.
Piracy: If you come across any illegal copies of our works in any form on the Internet, we would be grateful if you would provide us with the location address or website name. Please contact us at [email protected]
with a link to the material.
If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit http://authors.packtpub.com.
Please leave a review. Once you have read and used this book, why not leave a review on the site that you purchased it from? Potential readers can then see and use your unbiased opinion to make purchase decisions, we at Packt can understand what you think about our products, and our authors can see your feedback on their book. Thank you!
For more information about Packt, please visit packt.com.
3.147.42.168