Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Cyber Warfare – Truth, Tactics, and Strategies

You're reading from   Cyber Warfare – Truth, Tactics, and Strategies Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

Arrow left icon
Product type Paperback
Published in Feb 2020
Publisher Packt
ISBN-13 9781839216992
Length 330 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Dr. Chase Cunningham Dr. Chase Cunningham
Author Profile Icon Dr. Chase Cunningham
Dr. Chase Cunningham
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. A Brief History of Cyber Threats and the Emergence of the APT Designator 2. The Perimeter Is Dead FREE CHAPTER 3. Emerging Tactics and Trends – What Is Coming? 4. Influence Attacks – Using Social Media Platforms for Malicious Purposes 5. DeepFakes and AI/ML in Cyber Security 6. Advanced Campaigns in Cyber Warfare 7. Strategic Planning for Future Cyber Warfare 8. Cyber Warfare Strategic Innovations and Force Multipliers 9. Bracing for Impact 10. Survivability in Cyber Warfare and Potential Impacts for Failure 11. Other Books You May Enjoy
12. Index
Appendix – Major Cyber Incidents Throughout 2019

A global perimeter falls

Another example of how the technical alignment of the perimeter-based model helps proliferate exploitation and is woefully ineffective at combatting current threat actions comes from an analysis of what happened to the shipping giant Maersk.

In 2017, a Ukrainian company with software used for accounting – the Linkos group – was operating as normal. Unbeknownst to the IT leaders and users at this company, the servers that were connected to hundreds of clients and responsible for updating their accounting software were the launching point for the initial proliferation of the NotPetya ransomware attack.

The Linkos group, which did nothing "wrong" other than be located in a country that was actively being targeted by the military wing of the cyber operations branch of the Russian government, had been the victim of months of covert exploitation conducted to gain a military advantage in the region.

The Russian cyber warfare...

You have been reading a chapter from
Cyber Warfare – Truth, Tactics, and Strategies
Published in: Feb 2020
Publisher: Packt
ISBN-13: 9781839216992
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image