Cyberwarfare: An Introduction To Information-Age Conflict
368
71
6MB
English
Pages 379
Year 2020
Report DMCA / Copyright
DOWNLOAD DJVU FILE
Table of contents :
Contents......Page p0008.djvu
Foreword......Page p0020.djvu
Preface......Page p0022.djvu
1.2 Information......Page p0024.djvu
1.3 Networks and Technology......Page p0027.djvu
1.4 The Internet, the Web, and the Information Age......Page p0033.djvu
1.5 Defining and Characterizing Cyberspace......Page p0034.djvu
1.6 Security Terms......Page p0036.djvu
1.7 Defining and Describing Cyberspace Operations......Page p0041.djvu
1.8 Electronic Warfare and Spectrum Operations......Page p0044.djvu
1.9 Information Warfare......Page p0047.djvu
1.10 Weapons and Missions of Warfare......Page p0050.djvu
1.11 Chapter Summary......Page p0053.djvu
2.2 Three Steps for Offensive Cyber Operations......Page p0058.djvu
2.3 Attack Phases......Page p0063.djvu
2.4 Synthesis of Steps and Phases......Page p0065.djvu
2.5 Synthesis of Steps and Phases......Page p0069.djvu
3.2 Defining Risk in Cyberspace......Page p0074.djvu
3.4 Risk Cube......Page p0078.djvu
3.5 Risk Assessment......Page p0079.djvu
3.6 Risk Management......Page p0087.djvu
3.7 Risk Mitigation......Page p0088.djvu
3.8 Quantitative Risk Analysis......Page p0090.djvu
3.10 Summary......Page p0092.djvu
4.1 Introduction: International Law and Cyberspace Operations......Page p0096.djvu
4.2 Overview of the Law of Armed Confl ict......Page p0097.djvu
4.3 Key Terms......Page p0098.djvu
4.4 The UN Charter......Page p0100.djvu
4.5 Effects in Cyberspace and Their Legality......Page p0101.djvu
4.6 Defining a Violent Act of War in Cyber......Page p0103.djvu
4.7 The Gray Zone and Hybrid Warfare......Page p0106.djvu
4.8 Case Study: Iranian Attacks on the United States......Page p0108.djvu
4.9 Voluntary (Political) Norms......Page p0109.djvu
4.10 Roles and Responsibilities Outlined by the U.S. Government......Page p0111.djvu
4.11 Attribution of Attacks......Page p0117.djvu
CHAPTER 5\rDigital and Wireless Communication......Page p0122.djvu
5.1 Creating and Transmitting Bits......Page p0123.djvu
5.2 Smartphones......Page p0124.djvu
5.3 Wireless Communication......Page p0126.djvu
5.4 Generational Improvements in Wi-Fi......Page p0127.djvu
5.5 Generational Improvements in Mobile Wireless Communication......Page p0128.djvu
5.6 Mobile and Smartphone Communication Channels andArchitectures......Page p0136.djvu
5.8 Attacks on End-User Devices......Page p0138.djvu
5.9 Attacks on RANs......Page p0139.djvu
5.10 Attacks on Core Networks (SS7)......Page p0140.djvu
5.12 NFC and Hacks......Page p0142.djvu
5.13 Observations on Vulnerabilities of Cell Phones......Page p0143.djvu
6.1 Packet-Switched Networking......Page p0146.djvu
6.2 The IP Suite......Page p0149.djvu
6.4 Protocols and Software at Each Layer......Page p0152.djvu
6.5 Devices at Each Layer......Page p0153.djvu
6.6 Requirements for Packet-Switched Networking: Addressing Schemes......Page p0155.djvu
6.7 Why the Internet Is Insecure......Page p0159.djvu
7.2 Ethernet......Page p0162.djvu
7.3 Connecting to Wi-Fi......Page p0169.djvu
7.4 Encryption and Sophisticated Authentication in Wi-Fi......Page p0176.djvu
7.5 Wi-Fi Security Protocols......Page p0178.djvu
7.6 Secure Wi-Fi Authentication......Page p0182.djvu
7.7 Taxonomy of Attacks Terms and Techniques Associated with Wi-Fi......Page p0185.djvu
7.8 Wi-Fi Vulnerability......Page p0186.djvu
7.9 Wi-Fi Hacking and Cracking Tools......Page p0187.djvu
7.10 Bluetooth Vulnerabilities, Hacking, and Cracking......Page p0189.djvu
7.11 Satellite Communication Phones and Iridium......Page p0192.djvu
CHAPTER 8\rIntroduction to Internet Protocol and\rIP Addresses......Page p0196.djvu
8.1 IP datagram format......Page p0197.djvu
8.3 IP Addressing and IP Routing......Page p0200.djvu
8.4 Ports......Page p0205.djvu
8.5 Network Ad dress Translation......Page p0207.djvu
8.7 ARP......Page p0209.djvu
8.9 Conclusions......Page p0210.djvu
9.1 Introduction to TCP......Page p0212.djvu
9.2 Establishing and Maintaining a TCP Session......Page p0217.djvu
9.3 TCP and Buffering......Page p0221.djvu
9.4 TCP State Machine......Page p0223.djvu
9.5 SYN Flood......Page p0227.djvu
9.7 Secure Transport Layer......Page p0230.djvu
9.8 Fake Certifi cate Authorities and the Confl ict in Syria......Page p0239.djvu
9.9 SSL/TLS MITM Attack......Page p0242.djvu
9.10 The Application Layer and the World Wide Web......Page p0243.djvu
9.11 The Internet and Its Infrastructure......Page p0244.djvu
9.12 Submarine Cable Attacks on Internet Infrastructure......Page p0247.djvu
9.13 DNS......Page p0249.djvu
9.14 Case Study: Anonymous DDOS Attacks Using SYN Flooding......Page p0253.djvu
10.1 Motivation and Introduction......Page p0260.djvu
10.2 Defi nitions: Strategy, Tactics, Techniques, and Procedures......Page p0265.djvu
10.3 Background: Components and Equipment for ICS......Page p0267.djvu
10.4 Background: Inherent Vulnerabilities in Modern ICS......Page p0273.djvu
10.5 Background: Backdoors and Command and Control Servers......Page p0274.djvu
10.6 Case Studies of Attacks and Exploits of ICS......Page p0280.djvu
10.7 Conclusions......Page p0288.djvu
11.1 Overview of Attack Steps......Page p0292.djvu
11.2 Gaining Access through and Exploitation of Web Applications......Page p0299.djvu
11.3 Maintaining Access......Page p0319.djvu
11.4 Summary......Page p0322.djvu
12.2 General Vulnerabilities in the Maritime Domain......Page p0326.djvu
12.3 Specific Maritime Components and Their Vulnerabilities......Page p0329.djvu
12.4 Bridge and Navigation System Vulnerabilities......Page p0330.djvu
12.5 Demonstrated Exploitation of Vulnerabilities and Other PotentialHacks......Page p0339.djvu
12.6 Conclusions and Summary......Page p0342.djvu
13.1 Motivation and Background......Page p0346.djvu
13.2 Threat Actors and Threats to Election Systems......Page p0349.djvu
13.3 The Election Process Attack Surface and Vulnerabilities......Page p0351.djvu
13.4 The Attack on the 2016 U.S. Presidential Election......Page p0354.djvu
13.5 Conclusions......Page p0359.djvu
About the Author......Page p0362.djvu
Index......Page p0364.djvu