Cyber Warfare – Truth,Tactics,and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
by: Dr. Chase Cunningham and Gregory J. Touhill
Print Length 页数: 330 pages
Publisher finelybook 出版社: Packt Publishing (February 25,2020)
Language 语言: English
ISBN-10: 1839216999
ISBN-13: 9781839216992
Book Description
By finelybook
Insights into the true history of cyber warfare,and the strategies,tactics,and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.
The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare – Truth,Tactics,and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by: AI,big data,autonomous vehicles,drones video,and social media.
Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking,he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light.
The book not only covers cyber warfare,but it also looks at the political,cultural,and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario.
Cyber Warfare – Truth,Tactics,and Strategies is as real-life and up-to-date as cyber can possibly be,with examples of actual attacks and defense techniques,tools. and strategies presented for you to learn how to think about defending your own systems and data.
What you will learn
Hacking at scale – how machine learning (ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise
Using video and audio as weapons of influence
Uncovering DeepFakes and their associated attack vectors
Using voice augmentation for exploitation
Defending when there is no perimeter
Responding tactically to counter-campaign-based attacks
Contents
Preface
Chapter 1: A Brief History of Cyber Threats and the Emergence of the APT Designator
Chapter 2: The Perimeter Is Dead
Chapter 3: Emerging Tactics and Trends-What Is Coming?
Chapter 4: Influence Attacks-Using Social Media Platforms for Malicious Purposes
Chapter 5: DeepFakes and Al/ML in Cyber Security
Chapter 6: Advanced Campaigns in Cyber Warfare
Chapter 7: Strategic Planning for Future Cyber Warfare
Chapter 8: Cyber Warfare Strategic Innovations and Force Multipliers
Chapter 9: Bracing for lmpact
Chapter 10: Survivability in Cyber Warfare and Potential Impacts for Failure
Appendix-Major cyber incidents throughout 2019
Other Books You May Enjoy
Index