Surviving Cyberwar
- Authors:
- Publisher:
- 2010
Summary
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack.
Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.
The book:
begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs;
follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world;
moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries;
provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and
finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works.
This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.
Search publication
Bibliographic data
- Copyright year
- 2010
- ISBN-Print
- 978-1-64143-256-6
- ISBN-Online
- 978-1-60590-675-1
- Publisher
- Government Institutes, Lanham
- Language
- English
- Pages
- 170
- Product type
- Book Titles
Table of contents
- CONTENTS No access
- ACKNOWLEDGMENTS No access
- INTRODUCTION No access
- Chapter 01. TITAN RAIN AND SHAWN CARPENTER No access Pages 1 - 10
- Chapter 02. THE RED WARS No access Pages 11 - 18
- Chapter 03. COUNTERING CYBER ESPIONAGE No access Pages 19 - 32
- Chapter 04. TOPPLING E-MAIL SERVERS No access Pages 33 - 44
- Chapter 05. THE PENTAGON No access Pages 45 - 50
- Chapter 06. GEOPOLITICAL CYBER HOT SPOTS No access Pages 51 - 60
- Chapter 07. DDOS DEFENSE No access Pages 61 - 72
- Chapter 08. CROWD SOURCING CYBER ATTACKS No access Pages 73 - 84
- Chapter 09. OH ESTONIA No access Pages 85 - 90
- Chapter 10. CYBERWAR CUTS A SWATH THROUGH EASTERN EUROPE No access Pages 91 - 94
- Chapter 11. GEORGIA: THE FIRST CYBERWAR No access Pages 95 - 104
- Chapter 12. CONFLICT CAUSES CHANGE No access Pages 105 - 114
- Chapter 13. FOUR PILLARS OF CYBERWAR No access Pages 115 - 130
- Chapter 14. CYBER PREPAREDNESS No access Pages 131 - 142
- Chapter 15. REPERCUSSIONS No access Pages 143 - 156
- BIBLIOGRAPHY No access Pages 157 - 160
- NOTES No access Pages 161 - 164
- INDEX No access Pages 165 - 168
- ABOUT THE AUTHOR No access Pages 169 - 170





