Index

A

Access tools
local privilege
local unprivileged
non-local privileged
non-local unprivileged
target relationship
access noticed
access unnoticed
DoS
ICBM
types
interactive access
none
non-interactive access
Anti-aircraft capabilities
Association
incidental
package/packet traversal
purposeful
to distract
obfuscation
self-attribution
weapon
tracert

B

Battle damage assessment (BDA)
Biological warfare
battle damage assessment
communicability
control
definition
effectiveness
ownership
target
tools

C

Central Intelligence Agency (CIA)
Communications intelligence (COMINT)
Cyber access operations
Cyber-attack
espionage
noise level
relationship
Title 10
types
deny, enemy
SeeEnemy denying
manipulation, enemy
SeeEnemy manipulating
warfighting
Cyber domain collection
direct collection
human source
cyber reconnaissance
espionage
HUMINT
message boards
physical
Title 50
indirect collection
open source collection
Cyber exploitation
activity
definition
logical memory layout
overflown buffer
title implications
vulnerability
SeeVulnerability types
Cyber-physical actions
Cyber reconnaissance
Cyberspace operations
Cyber warfare
cyber-physical connection
declaration
definition
digital attack
DoD
internet
protection expectation
reliable attribution
Cyber warfighting
activity process
cyber-physical effect
non-technical
security software

D

Denial-of-service (DoS) attacks
Department of Defense (DoD)
covert action
cyber-enabled intelligence
cyber tools
military operations
Title 10 activities
US responses
Chinese intelligence officers
Chinese spy agency
cyber activity
cyber war attack
hackers
intelligence community
Title 50
warfighting domain
Department of Energy (DoE)
Department of Homeland Security (DHS)
Department of National Intelligence (DNI)
Department of State (DoS)

E

Electronic intelligence (ELINT)
Enemy denying
degrade attacks
cyber weapon
firewall drop communications
sanctions
destroy attacks
digital files
missile, damage
oil refiners, destruction
disrupt attacks
cyber-attack tool
enemy state
physical example
goal
Enemy manipulating
aggressive, human perception
danger indicators
social media accounts
Title 10 activity
aggressive, sensor perception
laboratory devices
mobile LASERs
target metrics, read
protective, human perception
attacker resources
cyber exploitation
local law enforcement
military operation
protective, sensor perception
attacker’s traffic
enemy firewalls
military invasion
radar systems
Espionage
and cyber
definition
Title 18, US code
Executive Order (EO)
Exploit tools

F

Foreign instrumentation signals intelligence (FISINT)

G

Geneva Convention
Geospatial Intelligence (GEOINT)

H

Hague Convention
Human intelligence (HUMINT)

I

Imagery Intelligence (IMINT)
Incidental association
Intelligence community (IC)
budgetary oversight
cyber domain
delimiting line
DoD
relationships
Intelligence gathering
cyber domain
cyber reconnaissance
objectives
SIGINT
social media
types
Intercontinental ballistic missiles (ICBMs)
International agreements
cyber-attack
Geneva Convention
Hague Convention
international humanitarian law
International humanitarian law

J, K

Just war theory
Jus ad bellum
jus in bello
combatant/non-combatant
cyber-attack
just warfare
Stuxnet virus
policies/guidelines

L

Logical memory layout
Logical process of attribution
association
discovery
identification
motivation

M

Measurement and Signature Intelligence (MASINT)
Metadata
Metasploit
Meterpreter
Misconceptions
attributed perpetrator
communication dependability
cost effectiveness
cyber exploitation
hacker
ineffective weaponry
resource availability
returning fire
shelf life
static targets
target availability
target dictation

N

National Air and Space Intelligence Center (NASIC)
National Intelligence Strategy (NIS)
National Security Agency (NSA)

O

Obfuscation infrastructure
Obfuscation resources
Open Source Center (OSC)
Open-Source Intelligence (OSINT)
Operational resources
access tools
attack tools
exploits
Overflown buffer

P, Q

Personnel-based resources
people
skill
tradecraft
Post-attribution process
active response
attack responses
non-attack responses
intelligence gathering
malicious activity
Protection expectation
digital attack
internet
state-sponsored cyber effort
structure
US cyberspace
Purposeful association

R

Remote access tool kits (RATs)
Resource
access tools
attack effects
control
exploits
frontend and backend infrastructure
obfuscation infrastructure
ownership
tactics, techniques, and procedures/TTPs
warfighters
Rules of engagement (ROE)
access operations

S

Self attribution
intended
projecting force
unintended
SeeUnintentional self-attribution
Signals intelligence (SIGINT)
State-sponsored warfighting
Stuxnet virus
Support resources
backend infrastructure
frontend infrastructure
obfuscation

T

Tactical attributes
sophistication
targets
time stamping
Target
BDA
fidelity
intended
ROE
abort
failure
method
success
selection
accessing
cyber option
developing attack capability
essential considerations
existing attack capability
tactical vs . strategic response
cyber activity
cyber domain
cyber warfare
unintended
Technical attributes
access tools
attack effects
exploit tools
redirection points
time
Title implications
Tomahawk missiles
Tracert
Tradecraft
Trade-off
cost-benefit analysis
cyber-attack
Title 10

U

Uniformed code of military justice (UCMJ)
Unintentional self-attribution
actor association
battlefield preparation
intelligence gathering
actor identification
battlefield preparation
intelligence gathering
examples
battlefield preparation
indicator of compromise phase
indicators
intelligence gathering activities
Unmanned aerial vehicle (UAV)
US Cyber Command (CYBERCOM)

V, W, X, Y, Z

Vulnerability types
acceptable letter
categories
code vulnerability
human mistake
legitimate credentials
misconfiguration
rejected letter
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.14.63