Sell yours for a Gift Card
We'll buy it for $14.65
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Paperback – June 1, 2011

ISBN-13: 000-1597496375 ISBN-10: 1597496375 Edition: 1st

8 New from $40.99 15 Used from $30.79
Rent from Amazon Price New from Used from
Kindle
"Please retry"
$9.67
Paperback
"Please retry"
$40.99 $30.79
NO_CONTENT_IN_FEATURE
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 320 pages
  • Publisher: Syngress; 1 edition (June 1, 2011)
  • Language: English
  • ISBN-10: 1597496375
  • ISBN-13: 978-1597496377
  • Product Dimensions: 9.1 x 7.4 x 1 inches
  • Shipping Weight: 1.3 pounds
  • Average Customer Review: 3.8 out of 5 stars  See all reviews (13 customer reviews)
  • Amazon Best Sellers Rank: #905,345 in Books (See Top 100 in Books)

Editorial Reviews

Amazon.com Review

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats, and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors--our defenses must be ready all the time and our alert systems must detect the threats every time.

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Amazon Exclusive: Notes from Steve Winterfeld and Jason Andress, Authors of Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Although we have not had a cyber event that has motivated a country western song, there has been a major uptick in activity recently.

  • According to The Wall Street Journal, the Pentagon has announced that cyber attacks can be considered an act of war.
  • The Washington Post has published a DoD list of cyber weapons.
  • Major Defense contractors (Lockeed Martin, Northrop Grumman) as well as RSA were hacked by the Advanced Persistent Threat (state-sponsored threat most often associated with China).
  • Sony, the Public Broadcast System (PBS) and others have been hacked by Anonymous (a caused-based hackavist group). NATO talks about this group as a concern in a report to the General Assembly of the United Nations.
  • The U.S. President issued his International Strategy for Cyberspace and his Cybersecurity Legislative Proposal.
  • China has openly admitted to standing up a “cyber blue team.”
  • CNBC has aired a special titled “Code Wars,” covering the expanding threats we face.

It seems like a week doesn’t go by without a cyber story on the front page. We wrote Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners to help put these individual events in context as part of a larger environment with individual, organizational and national actors.


Featured Excerpts from Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Case Study
This diagram helps to facilitate a discussion on how an organization will use resources to solve their cyber challenges.
 The Cyber Threat Landscape
This graphic allows someone to look at the methodology used to conduct a cyber attack, as well as the tools and techniques employed. Then it shows who is conducting the attacks, what is used to defend against them, and what the attackers are after.

Top Documents to Read Related to Cyber Warfare
  1. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure; Melissa Hathaway (May 2009)
  2. Joint Terminology for Cyberspace Operations from Joint Staff (November, 2010)
  3. Memorandum of Agreement Between the Department of Homeland Security and Department of Defense Regarding Cybersecurity by Janet Napolitano and Robert Gates (October 2010)
  4. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation for US-China Economic and Security Review Commission (October 2009)
  5. Global Energy Cyber attacks: “Night Dragon” By McAfee® Foundstone® outlining efforts to infiltrate Energy Sector (February 2011)
  6. Project Grey Goose report reviewing cyber warfare as part of Russia’s attack on Georgia (January 2010)
  7. Tracking GhostNet : Investigating a Cyber Espionage Network (March 2009)

Key Related Documents Published After Cyber Warfare Went to Press:
  1. Cybersecurity Two Years Later By CSIS Commission on Cybersecurity for the 44th Presidency (January 31, 2011)
  2. Cybersecurity Proposed Legislation; The White House (May 12, 2011)
  3. International Strategy for Cyberspace; The White House (May, 2011)
  4. Department of Defense Strategy for Operating in Cyberspace; Department of Defense (July 2011)

Great Annual Reports to Keep Up With:
  1. The Top Cyber Security Risks by SANS
  2. 2010/2011 Computer Crime and Security Survey (15th Annual) by Computer Security Institute
  3. Ponemon Institute Annual Study: Cost of a Data Breach
  4. Symantec Global Internet Security Threat Reports
  5. Verizon Annual Data Breach Investigations Report

Review

".aimed at a military audience, this book offers concepts and examples largely from the U.S. Military."--Security Management, January 2013, page 60 "This book of around 300 pages and some 15 chapters, with a 'cyber timeline' appendix, provides an adequate coverage of the topics given that the whole area is subject to rapid change in both technical and policy terms. The foreword to the book again sets the scene. It asks the question 'just what should teaching on this vital subject involve and how should it be done?'. It then sets out the aim of the book as, to quote, 'to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today.' This ambitious aim is partially met but mainly from an intensely USA perspective even though some reviews are done of international policy settings as of the date of writing."--Computers & Security "The book is also crammed with details that keep it from being too dry a treatise - right from the foreword, where the president of security experts The SANS Institute confesses to being fooled into friending a fake Facebook persona (luckily for him, set up by a security researcher). The short final section of perspectives from a range of security experts is thought-provoking, but mostly this is a rigorous analysis of every aspect of cyber-war and defences against it.. At the end of Cyber Warfare you won't have a definitive answer on whether a true cyber-war is imminent. What you will have is a far better idea of the complexity of the situation, and a clear view of where to start evaluating threats to your infrastructure and how to protect against them."--ZDNet UK "Regardless of where the definition of cyber warfare finally settles, be it simply a war waged over the Internet, a technological cold war, network-based hostilities or simply another theater of war, there are without doubt activities that transpire over the wire that require much closer scrutiny not only by the security community but also by governments, businesses and the general public. The authors accurately and adeptly take the reader from the headlines to the front lines with frequent stops in underground communities, legislative halls and anywhere hackers (ethical or otherwise) are in high demand. This book serves as a report on the current cyber state of affairs on a global scale, as a career guide to those looking to enter this burgeoning field, and, most importantly, as a reference on protecting assets that are unmistakably in the field of battle...whether intended or not."--Donald C. Donzal, Editor-In-Chief, The Ethical Hacker Network "A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications "Now another view on cyber security comes from Steve Winterfeld, co-author of the recently published book on the subject, Cyber Warfare, Techniques, Tactics and tools for Security Practitioners, who believes the answer lies in punishing the hackers. 'Somewhere along the line we are going to have to change the cost/benefit equation,' said Winterfeld, "arresting and going after the individual, that's how we change the costs." But on state sponsored cyber warfare Winterfeld admits that is very difficult, and says he covers it thoroughly in chapter 14 of his book. Both Winterfeld and Oates spoke by phone on the ScienceNews Radio Network program, the Promise of Tomorrow with Colonel Mason."--News Examiner "Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts.  The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and no-state actors like organized criminals and terrorists.  Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time."--The Journal (of Law Enforcement)


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

If you work in the cyber-security industry - buy and read this book.
Dan B
The most obvious flaw is that the writers don't do a very good job of projecting credibility given the terrible writing in many places in the book.
Sean Butler
Excllent book for resaerch, and just to increase your knowledge of Cyber Warfare and what it takes to combat it.
Gregory L. Thompson

Most Helpful Customer Reviews

20 of 22 people found the following review helpful By Rick Howard on July 17, 2011
Format: Paperback Verified Purchase
"Cyber Warfare: Techniques, Tactics and Tools for the Security Practitioners" is a consolidation of the current thinking around the topic of cyber warfare; not the way you hear about in the media where everything is a war of some kind (War on drugs, War on Terrorism, etc) but a discussion about what it means to conduct warfare via cyberspace. This is a tough topic because there are so many opinions about what Cyber Warfare is that you could literally spend an entire book just covering the definitions. The authors deftly avoid that trap and manage to provide a coherent line of thinking around Computer Network Operations even when these kinds of activities bump up against other cyber space dangers like Cyber Crime, Cyber Hactavism, Cyber Espionage and Cyber Terrorism. This is a primer; a one stop shop to get you up to speed on the topic if you are new to it or a refresher even if you have been enmeshed in it for years.
'
The authors, Steve Winterfield and Jason Andress, cover everything you will want to consider when thinking about how to use cyberspace to conduct warfare operations. The primary concepts have been bouncing around US military circles for over a decade but they have never been collected into one tome before. Clarke and Knake's book, "Cyber War: The Next Threat to National Security and What to Do about It," discusses how weak the US network defenses are and offers suggestions about how to improve. Carr's book, "Inside Cyber Warfare: Maping the Cyber Underworld," presents threat examples and nation state capabilities. Libicki's book, "Cyberdeterrence and Cybrewar," attacks cyberwar from a policy viewpoint and does not really address operational considerations.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
11 of 12 people found the following review helpful By Sean Butler on February 6, 2012
Format: Paperback
This book is possibly unique in its choice of scope, apparently targeted at operational-level military cyber warfare professionals (though also seemingly attempting to broaden its audience to mid-level private-sector information security professionals). Since this is basically the exact audience I was hoping to target as an instructor for a course in operational cyber war, I had high hopes for this book, hoping to replace an array of texts each covering a slice of the subject matter. It helped that the authors appeared to have solid credentials. All in all, I was somewhat disappointed with the book, mostly with the lack of polish, though it's probably still worthwhile if you're looking for a book with this particular scope.

"Cyber Warfare" addresses the nature of the various threats in cyberspace, covering various actors, motives, methods, vulnerabilities, and potential effects. It does a good job of staying at a fairly high level without over-simplifying to the point of gross inaccuracy, though it does fall victim to the temptation of sensationalizing once in awhile.

The book doesn't go too far into the weeds with specific tools, only offering a basic familiarization with the purpose and functionality of some of the more well-known (and sometimes outdated) examples. You occasionally get a sense of "hey, look at this cool gee-whiz tool" with some of their selections, but in general, it serves as a good survey of potential inclusions in a security toolkit.

Operations are structured along the lines of military doctrine, addressing Computer Network Attack, Defense, and Exploitation with their own chapters.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Sean Moore on September 15, 2013
Format: Kindle Edition Verified Purchase
This is a good book on cyber warfare policy. I must note, however, that I bought it because the descriptions and reviews led me to believe that it included material on cyber warfare technology. In fact, it does not. I am just making other technologists aware of this so they can make a more informed decision to buy it (or not). I liked the book, it just was not what I expected.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By Dr Wayne on June 8, 2013
Format: Kindle Edition Verified Purchase
One should always know the wiles of the enemy and this book is an interesting introduction to tricks, tactics, and angles of attack that are being used. This book is a good starting place for the serious defender.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By CKV on November 23, 2011
Format: Paperback Verified Purchase
The authors of this book clearly have insights into the actual risks to our information, the related government response and inspiration for actions to take on a personal basis. Read this book to join the conversation with an informed point of view.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Syndicate on May 15, 2014
Format: Paperback Verified Purchase
This is a very good read, especially if you are looking for a military, and/or policy perspective. There are plenty of other books out there that go into the tech, but few that do a good job of bringing in military doctrine and a military style of thinking. Very interesting and isightful.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 5 people found the following review helpful By Richard L. Rankin on February 20, 2012
Format: Paperback Verified Purchase
Nothing new. But worth the read. If you're a security consultant you should definitely have this on your shelf. The word "cyber" gives IT directors the heebie-jeebies.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again