Waging cyber war : technical challenges and operational constraints /: technical challenges and operational constraints. ([2019])
- Record Type:
- Book
- Title:
- Waging cyber war : technical challenges and operational constraints /: technical challenges and operational constraints. ([2019])
- Main Title:
- Waging cyber war : technical challenges and operational constraints
- Further Information:
- Note: Jacob G. Oakley.
- Authors:
- Oakley, Jacob G
- Contents:
- Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Cyber and Warfare; Definition; Declaration; Just War Theory; Jus ad Bellum; Jus in Bello; International Agreements; Expectation of Protection; Summary; Chapter 2: Legal Authority; Title 50-Intelligence Community; Title 10-Department of Defense; Maintaining Military Operations; Covert Action; Bringing It Together; Known US Responses; Example 1; Example 2; Example 3; Example 4; Espionage; Defining Espionage; Title 18; Cyber and Espionage; Summary; Chapter 3: Cyber Exploitation Refined DefinitionExploitation; Types of Exploitation; Code Vulnerability; Misconfiguration; Human Mistake; Illegitimate Use of Legitimate Credentials; Valuing Vulnerability Categories; Title Implications; Summary; Chapter 4: Cyber-Attack; Attack Types; Denying the Enemy; Attacks that Degrade; Non-cyber Example; Cyber Example; Cyber-Physical Example; Attacks that Disrupt; Non-cyber Example; Cyber Example; Cyber-Physical Example; Attacks that destroy; Non-cyber Example; Cyber Example; Cyber-Physical Example; Manipulating the Enemy; Human Perception: Aggressive; Non-cyber Example; Cyber Example Cyber-Physical ExampleHuman Perception: Protective; Non-cyber Example; Cyber Example; Cyber-Physical Example; Sensor Perception: Aggressive; Non-cyber Example; Cyber Example; Cyber-Physical Example; Sensor Perception: Protective; Non-cyber Example; Cyber Example; Cyber-Physical Example; Espionage;Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Cyber and Warfare; Definition; Declaration; Just War Theory; Jus ad Bellum; Jus in Bello; International Agreements; Expectation of Protection; Summary; Chapter 2: Legal Authority; Title 50-Intelligence Community; Title 10-Department of Defense; Maintaining Military Operations; Covert Action; Bringing It Together; Known US Responses; Example 1; Example 2; Example 3; Example 4; Espionage; Defining Espionage; Title 18; Cyber and Espionage; Summary; Chapter 3: Cyber Exploitation Refined DefinitionExploitation; Types of Exploitation; Code Vulnerability; Misconfiguration; Human Mistake; Illegitimate Use of Legitimate Credentials; Valuing Vulnerability Categories; Title Implications; Summary; Chapter 4: Cyber-Attack; Attack Types; Denying the Enemy; Attacks that Degrade; Non-cyber Example; Cyber Example; Cyber-Physical Example; Attacks that Disrupt; Non-cyber Example; Cyber Example; Cyber-Physical Example; Attacks that destroy; Non-cyber Example; Cyber Example; Cyber-Physical Example; Manipulating the Enemy; Human Perception: Aggressive; Non-cyber Example; Cyber Example Cyber-Physical ExampleHuman Perception: Protective; Non-cyber Example; Cyber Example; Cyber-Physical Example; Sensor Perception: Aggressive; Non-cyber Example; Cyber Example; Cyber-Physical Example; Sensor Perception: Protective; Non-cyber Example; Cyber Example; Cyber-Physical Example; Espionage; Summary; Chapter 5: Cyber Collection; Cyber Intelligence Gathering; Cyber Domain Collection Examples; Open Source Collection; Non-cyber Example; Cyber Intelligence Example; Cyber Reconnaissance Example; Human Source Collection; Non-cyber Example; Cyber Intelligence Example Cyber Reconnaissance ExamplePhysical-Cyber Example; Direct Collection; Non-cyber Example; Cyber Intelligence Example; Cyber Reconnaissance Example; Physical-Cyber Example; Indirect Collection; Non-cyber Example; Cyber Intelligence Example; Cyber Reconnaissance Example; Physical-Cyber Example; Understanding the Trade-Off; Summary; Chapter 6: Enemy Attribution; Logical Process of Attribution; Discovery; Association; Identification; Motivation; Post-attribution Process; Is Active Response Itself Appropriate?; Active Responses; Attack Responses; Non-attack Responses; Attributes Technical AttributesExploit Tools; Access Tools; Attack Effects; Redirection Points; Time; Tactical Attributes; Timing; Targets; Sophistication; Forget Everything You Thought You Knew; Unsteady Foundation; Summary; Chapter 7: Targeting; Tactical vs. Strategic Response; Target Selection; Appropriate Targets; The Cyber Option; Existing Capability; Developing the Capability; Access to the Target; BDA; Target Fidelity; Rules of Engagement; Method; Success; Abort; Failure; Summary; Chapter 8: Access; Access Tools; Levels of Access; Local Unprivileged; Local Privileged; Non-local Unprivileged … (more)
- Publisher Details:
- Berkeley, CA : Apress
- Publication Date:
- 2019
- Extent:
- 1 online resource (200 pages)
- Subjects:
- 355.4/1
Cyberspace operations (Military science)
Cyberterrorism
Electronic books - Languages:
- English
- ISBNs:
- 9781484249505
- Related ISBNs:
- 148424950X
- Notes:
- Note: Includes bibliographical references.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.449700
- Ingest File:
- 02_582.xml