Cyber Warfare, 2Nd Ed by Syngress

Cyber Warfare, 2Nd Ed by Syngress

CYBER WARFARE SECOND EDITION CYBER WARFARE Techniques, Tactics and Tools for Security Practitioners SECOND EDITION JASON ANDRESS STEVE WINTERFELD LILLIAN ABLON Technical Editor AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Syngress is an imprint of Elsevier Acquiring Editor: Chris Katsaropoulos Editorial Project Manager: Benjamin Rearick Project Manager: Punithavathy Govindaradjane Designer: Mark Rogers Syngress is an imprint of Elsevier 225 Wyman Street, Waltham, MA 02451, USA Copyright # 2014 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein. Library of Congress Cataloging-in-Publication Data Andress, Jason. Cyber warfare : techniques, tactics and tools for security practitioners / Jason Andress, Steve Winterfeld. – Second edition. pages cm Includes bibliographical references and index. ISBN 978-0-12-416672-1 (pbk.) 1. Information warfare–Handbooks, manuals, etc. 2. Computer networks–Security measures– Handbooks, manuals, etc. I. Winterfeld, Steve. II. Title. III. Title: Cyberwarfare, techniques, tactics and tools for security practitioners. U163.A64 2014 355.3043–dc23 2013034031 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library ISBN: 978-0-12-416672-1 Printed and bound in the United States of America 14 15 16 17 18 10 9 8 7 6 5 4 3 2 1 For information on all Syngress publications, visit our website at store.elsevier.com/Syngress Acknowledgments We thank our families and friends for their guidance, support, and fortitude throughout this project. We dedicate this book to those in the security industry who are making the world a better place through efforts like Hackers for Charity (You may have seen their T-shirts— “i hack charities.” For more information, go to http://hackersforcharity.org/). To those who are not we say—get engaged! vii Foreword WHY A BOOK ON CYBER they had accessed US physical war plans. WARFARE IS IMPORTANT Also last week Edward Snowden claimed the United States and Israel co-wrote the “...it’s now clear this cyber threat is one of Stuxnet worm to damage the Iranian Nuclear the most serious economic and national se- program; today, we are still trying to figure curity challenges we face as a nation,” out exactly how Stuxnet worked. And while Obama said, adding, “...we’re not as pre- WikiLeaks and Anonymous (the ideology- pared as we should be, as a government or driven group intent on punishing organiza- as a country” [1]. tions that did not support WikiLeaks) have been in the news of late, the theft of RSA According to the Director of National In- two-factor authentication intellectual prop- telligence James Clapper, “The cyber warfare erty is especially chilling. If access control threat facing the United States is increasing fails, everything fails. Identity theft is so in scope and scale and its impact is difficult commonplace that it is no longer newswor- to overstate” [2]. A variety of educational in- thy. How many people in the United States stitutions, both military and civilian, are have had their identity stolen? Many experts grappling with the question, “What should say all of them. There is just so much stolen we teach each and every one of our students data that the criminals have not yet figured about cybersecurity?” When these students out how to use them all. But they will. Crim- take their places as leaders and officers in inal groups are hiring computer scientists to the defense of our country, they need to be run their cyber-based scams and mine the re- aware of this persistent threat. sults. The term cyber warfare is becoming part Today’s threatscape is constantly chang- of discussions on national security. Cyberse- ing, adapting to our countermeasures and curity is an issue that can impact us at the continuing to successfully pursue various personal level as users of the Internet and missions ranging from identity theft, to crim- at the national defense level as an advanced, inal and nation-based corporate espionage, persistent threat. and, in the case of a worm called Stuxnet, to sabotage. Only a decade ago we had kids attacking systems for the thrill of it; then it was criminals attacking identities. Now it WHY SHOULD YOU READ appears to be more about social media, THIS BOOK ideology, and insider threats. This book pro- vides great graphics for the threatscape and Everyone needs to understand the risks to challenges we are facing today. our information so that we can make an in- In May, the Atlantic Wire reported China formed decision regarding the steps that was winning the cyberwar, in part because we might take to secure it. ix x FOREWORD The Internet connection in your home that the “why,” as the authors explore the ethics you use to talk to friends with Skype, play and legal issues of this new battlefield. Then games, and send email may also be used to the book defines and analyzes the challenges conduct crimes, undertake international es- facing cyberspace. Finally, it looks at trends pionage, and quite possibly fight a new kind in this arena. of war. Cyber Warfare will provide readers with a This new Wild West of the Internet mat- strong foundational understanding of a ters to each of us at both the personal and na- threat they see every week in the news. tional levels. Cyber Warfare is focused more Here is why that matters: In the beginning on the national level and what the Depart- of this Foreword, I said my head was spin- ment of Defense (DoD) has done and ning. Why? Because there is so much new is doing. stuff that I can’t keep track of? Actually, A week doesn’t go by without a story of a no. What amazes and scares me is that cyber attack, hacker group causing a data we are having the same conversations we breach or malcode spreading across the In- had 13 years ago when I was chief for infor- ternet. Cyber Warfare puts the threatscape mation warfare at the Ballistic Missile De- into context by showing how the threat fense Organization. Granted, today there operates as well as how all the different are more acronyms, and more money is in- stories relate to one another. volved. But none of the fundamental issues If you work with the US government, or have changed. Back then, the Russians were want to know what the US government is do- pursing international agreements to treat ing to organize and respond to the cyber cyber attacks as strategic weapons. We threat, Cyber Warfare lays it out in comprehen- did not listen, I think, because we thought sive detail. The authors will show you how our technology and techniques were supe- cyber attacks and defense intersect with each rior. In addition, a lot of people were in de- of the classic warfighting domains of land nial—“Is this cyber attack stuff really an (Army), sea (Navy), air (Air Force), space issue?” And far more people just did not (Joint, with Air Force in the lead), and cyber have a clue. If it did not have to do with (ubiquitous, with US Cyber Command the Redskins or Cowboys, it could not pos- [USCYBERCOM] just getting organized). sibly matter. But we forgot something. We Cyber Warfare covers the doctrine being had the most to lose. The United States developed today and lays out the tactics, has more information online than any other techniques, and procedures of Computer country, and that makes us the biggest tar- Network Operations (CNO) including at- get. We had an opportunity more than a de- tack, defend, and exploit (the military term cade ago to begin the dialog of for reconnaissance or spying), plus the new government–private industry partnerships. aspect of social engineering. On a personal We had an opportunity to begin to establish note, it is easy to read about social engineer- international agreements. We largely ing and think “yeah, yeah, yeah,” but I, squandered those opportunities. Now they among many others, friended Robin Sage, a have returned. Compelling evidence sug- fake personality created by a security re- gests that there is a cyber threat. We need searcher to see how much data could be col- to educate ourselves, do our part, and en- lected, on Facebook.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    310 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us