Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 3 von 40999
First edition, [2024]
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Cyber Operations : A Case Study Approach
Auflage
First edition
Ort / Verlag
Hoboken, New Jersey : Wiley,
Erscheinungsjahr
[2024]
Beschreibungen/Notizen
  • Description based upon print version of record.
  • Includes bibliographical references and index.
  • Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber - A 21st-Century Collection Channel -- 1.1.2 Hackers - Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations - ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations -- 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations -- 2.2.1 Three-Phase Insurgency Model with Cyber - ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency -- 3.1.4 Cyber Gangs - Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations.
  • 4.1 Nation State Cyber Operations -- 4.1.1 Advanced Persistent Threats -- 4.1.2 Nation-State Cyber Operations against Critical Infrastructure -- 4.1.3 Elements of a Nation-State Cyber Organization -- 4.1.3.1 Cyber Research Institutions -- 4.1.3.2 Cyber Engineering and Development -- 4.1.3.3 Cyber and Clandestine Services -- 4.1.4 Structure of Nation-State Cyber Operations and Maneuver -- 4.1.4.1 Cryptocurrencies, Sanctions, and Subversion -- 4.1.5 Nation-State Cyber Operations Wrap-up -- Bibliography -- Chapter 5 Russian Cyber Operations -- 5.1 Russian Cyber Operations -- 5.1.1 Russian Policy, Tools, and Historical Use of Information Operations -- 5.1.1.1 Policy, Statecraft Tools, and Cryptocurrency -- 5.1.1.2 Information Operations, Developing Doctrine, and Russian Cyber Teams -- 5.1.1.3 Estonia Denial of Service Attack (2007) -- 5.1.2 Russian Information Operations -- 5.1.2.1 The Russian Federal Security Service (FSB) -- 5.1.2.2 Russia and Ukrainian Power System Attacks -- 5.1.2.3 Foreign Intelligence Directorate (SVR)(APT 29 - Nobelium) -- 5.1.2.4 2020 SolarWinds (SVR) -- 5.1.2.5 Military Intelligence Directorate (GRU) -- 5.1.3 2022 Ukraine Invasion -- 5.1.4 Russian Cyber Operations Wrap-up -- Bibliography -- Chapter 6 Chinese Cyber Operations -- 6.1 Chinese Cyber Operations -- 6.1.1 Chinese Cyber Doctrine Development -- 6.1.2 2002-2012 Chinese Cyber Development Phase -- 6.1.2.1 2002-2007 Operation Titan Rain -- 6.1.2.2 2009 Operation Aurora -- 6.1.2.3 2007-2013 Operation Night Dragon - U.S. Gas Pipeline Intrusion Campaign -- 6.1.3 2012 to Present - Cyber Professionalization -- 6.1.3.1 Hacking/Cracking Training in China -- 6.1.3.2 Information Security Ironman -- 6.1.3.3 Cyber Collections on U.S. Personnel -- 6.1.3.4 Espionage and Five-Year Plans -- 6.1.3.5 Information Operations.
  • 6.1.3.6 2022 Booz Allen Hamilton (BAH) Cyber Analytic Framework for China -- 6.1.4 Chinese Cyber Operations Wrap-up -- Bibliography -- Chapter 7 DPRK Cyber Operations -- 7.1 DPRK Cyber Operations -- 7.1.1 DPRK Policy Development -- 7.1.1.1 Kim Il Sung (1948-1994) -- 7.1.1.2 Kim Jong Il (1994-2011) -- 7.1.1.3 Kim Jong Un (2011-present) -- 7.1.2 DPRK Intelligence Structure -- 7.1.2.1 Ministry of State Security -- 7.1.2.2 Worker's Party of Korea -- 7.1.2.3 Reconnaissance General Bureau (APT 43) -- 7.1.3 Example DPRK Cyber Operations -- 7.1.3.1 Sony Hack (2014) -- 7.1.3.2 Bangladesh Bank Heist (2016) -- 7.1.3.3 Operation FashCash (2018) -- 7.1.3.4 WannaCry Ransomware Attack (2017) -- 7.1.3.5 Cryptocurrency -- 7.1.4 DPRK Cyber Operations Wrap-up -- Bibliography -- Chapter 8 Iranian Cyber Operations -- 8.1 Iranian Cyber Operations -- 8.1.1 Iranian Cyber Operations Background -- 8.1.2 Iranian Cyber Support - Contractors, Proxies, and International Partners -- 8.1.2.1 Iranian Cyber Contractors (Internal to Iran) -- 8.1.2.2 Iranian Cyber Proxies (External to Iran) -- 8.1.2.3 Iranian Cyber Partners (External to Iran) -- 8.1.3 Iranian Cyber Teams and Targets -- 8.1.3.1 Iranian Cyber Teams (APTs) -- 8.1.3.2 2012-2014 Navy-Marine Corps Internet (NMCI) Attack -- 8.1.3.3 2020 U.S. Elections -- 8.1.3.4 2022 Albanian Cyber Attack by Iran -- 8.1.4 Iranian Cyber Operations Wrap-up -- 8.A Cost of Iranian Cyber Attacks -- Bibliography -- Chapter 9 Independent Cyber Operators -- 9.1 Independent Cyber Operations -- 9.1.1 Hackers -- 9.1.1.1 Star Wars, Computer Networks, and the Former Soviet Union's KGB (mid-1980s) -- 9.1.1.2 Morris Worm (1988) -- 9.1.1.3 Jester - Air Traffic Control and Telephone Service (1997) -- 9.1.1.4 Chinese Hacktivists (1998) -- 9.1.1.5 Maroochy Shire (2000).
  • 9.1.1.6 Slammer and Sobig - Business Systems, Nuclear Power Plants, and Train Signaling (2003) -- 9.1.1.7 Conficker (2008-2011) -- 9.1.1.8 Wikileaks (2006 to present) -- 9.1.2 Hackers in the Russo-Ukraine War (2022+) -- 9.1.2.1 Independent Operations and the Russo-Ukraine War (2022+) -- 9.1.2.2 Killnet - Pro-Russian Operations -- 9.1.3 Independent Cyber Operations Wrap-up -- Bibliography -- Section I Cyber Operations Summary -- I.1 Introduction -- I.2 Phases of Cyber Operations -- I.2.1 1980s-2002 -- I.2.2 2003-2012 -- I.2.3 2013-present -- Bibliography -- Section II Introduction to Cyber Effects -- II.1 Cyber Effects Introduction -- II.1.1 Example of Cyber Strategic, Tactical, and Criminal Effects -- II.1.1.1 Strategic Cyber Effects -- II.1.1.2 Tactical Cyber Effects -- II.1.1.3 Criminal Cyber Effects -- II.1.2 Wrap-up -- Bibliography -- Chapter 10 Strategic Cyber Effects -- 10.1 Strategic Cyber Effects -- 10.1.1 STUXNET (2010) - Delaying a Nation-State's Nuclear Program -- 10.1.2 STUXNET Versus Operation Desert Fox Wrap-up -- Bibliography -- Chapter 11 Strategic Cyber Effects (2) -- 11.1 Critical Infrastructure Strategic Cyber Effects -- 11.1.1 Critical Infrastructure -- 11.1.1.1 Energy Sector -- 11.1.1.2 Telecommunications -- 11.1.1.3 Water -- 11.1.1.4 Agriculture -- 11.1.1.5 Rail -- 11.1.1.6 Election Attacks (IO) (2011s) -- 11.1.2 Media-Based Cyber Operations -- 11.1.3 Cyber Espionage Effects -- 11.1.3.1 Using Cyber to Speed Up the Development of a Fifth-Generation Fighter (e.g., J-31 from F-35 Drawings) -- 11.1.4 Cyber Strategic Effects' Wrap-up -- 11.A Strategic Effect Examples -- Bibliography -- Chapter 12 Tactical Cyber Effects -- 12.1 Cyber Tactical Effects -- 12.1.1 Conventional Example - Denying the Syrian Air Force's Ability to Operate -- 12.1.2 Russian Uses of Cyber (From 2007) -- 12.1.3 ISIS and the Cost of Suppressing a Cyber Entity.
  • 12.1.3.1 ISIS and Cyber-Based Attacks -- 12.1.3.2 Monitoring ISIS -- 12.1.3.3 Israeli Bombing of Hamas Cyber Operators -- 12.1.4 Tactical Cyber Effects' Wrap-up -- 12.A Cost of Example Tactical Cyber Attacks (Iran) -- Bibliography -- Chapter 13 Cyber Crime Effects -- 13.1 Criminal Cyber Effects -- 13.1.1 Records Theft -- 13.1.1.1 Cost of a Data Breach -- 13.1.1.2 Business Records Attacks (2006-2019) -- 13.1.1.3 2017 Large Exfiltration Attack Example (Equifax (2017) - 143 Million Records) -- 13.1.2 Cyber Crime Examples -- 13.1.2.1 Conficker (2011) -- 13.1.2.2 Silk Road (2013) -- 13.1.2.3 Bangladesh Bank (2016) -- 13.1.2.4 Hydra (2015-2022) -- 13.1.2.5 Ransomware (&gt -- 2017) -- 13.1.3 Cyber Criminal Organizations - Gangs and Nation-States -- 13.1.3.1 Cyber Gangs -- 13.1.3.2 CONTI Ransomware Group -- 13.1.3.3 Nation-State Use of Cyber Crime -- 13.1.4 Cyber Crime Effects' Wrap-up -- Bibliography -- Section II Cyber Effects Conclusions -- II.1 Cyber Effects Overview -- II.2 Cyber Effects' Wrap-up -- Bibliography -- Section III Cyberspace Environment and Tools Introduction -- Bibliography -- Chapter 14 Criminal Cyber Operations and Tools -- 14.1 Criminal Cyber Operations and Tools -- 14.1.1 Shadow Brokers' Tools -- 14.1.1.1 Criminals Continue to Misuse Cobalt Strike -- 14.1.2 Malware Loaders -- 14.1.2.1 EMOTET -- 14.1.2.2 HIVE Ransomware Group use of Cobalt Strike Example -- 14.1.3 Botnets -- 14.1.3.1 Mirai Botnet -- 14.1.4 Criminal Cyber Tools' Wrap-up -- Bibliography -- Chapter 15 Russian Cyber Operations and Tools -- 15.1 Russian Cyber Operations and Tools -- 15.1.1 Example Operations' Attack Paths -- 15.1.1.1 U.S. Star Wars Missile Defense -- 15.1.1.2 Moonlight Maze (1990s) -- 15.1.1.3 Snake Botnet (&gt -- 2000) -- 15.1.2 Russian Cyber Operations and Tools -- 15.1.2.1 Vulkan - Russian Cyber Tools Developer -- 15.1.2.2 FSB -- 15.1.2.3 SVR.
  • 15.1.2.4 Russian Cyber Operations and the Ukraine.
  • Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations. Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed. Cyber Operations readers will also find: Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure Insight from an author with top-level experience in cyber security Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.
  • Description based on publisher supplied metadata and other sources.
  • Description based on print version record.
Sprache
Identifikatoren
ISBN: 1-119-71212-2, 1-119-71211-4, 1-119-71210-6
OCLC-Nummer: 1429725201
Titel-ID: 9925175991806463
Format
1 online resource (323 pages)
Schlagworte
Computer security, Information technology