Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Legacy signals
Legacy popularity: 2,494 legacy views
With all the news articles about China hacking into American companies, India breaking into the US Government, Wikileaks, data breaches, cyber-attacks, Pentagon elevation that cyber-attacks could be regarded as an act of war, etc., I thought I had better educate myself and make the leap from identity theft protector to cyber warrior.
For me, the best way to educate myself on critical events in my industry is to start reading some of the latest books on the market. “Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners” by Jason Andress and Steve Winterfeld is one such book that I am studying. It promises that “the concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists”.
Even though I am very much a online security professional, I wanted to approach this topic from a layman’s perspective and help develop some strategies that even the small business owner or individual can easily understand and deploy to protect their data.
I will be doing a series of posts that highlights some lessons and thoughts I learned in each of the different chapters of this book and bring out some key points the authors are making. I will not be doing a Cliff Notes version of the book but rather give enough insight to encourage you to also want to read the book and learn how to protect your online presence.
In the Foreword a shocking statement caught my eye that scared the holy pajesus out of me. It needs to be the default text message whenever you start up any computer.
“Identity theft is so commonplace it is no longer [considered] newsworthy. There is just so much stolen data, [that] the criminals have not yet figured out how to use it all. But they will.” – Stephen Northcutt, President, The SANS Technology Institute.
Cyber Warfare Techniques Tactics and Tools for Security Practitioners - Book review by Dovell Bonnett of Access Smart.com
Chapter 1: What is Cyber Warfare?
Being that the title of the book is Cyber Warfare, it would seem that a standard, acceptable definition would be offered. However, that is not the case. It seems that trying to come up with a definition for Cyber Warfare is more difficult than imagined because there are no recognized definitions for “cyberspace” or “warfare”. This conundrum makes me want to paraphrase Supreme Court Justice Potter Stewart’s original quote on pornography and adjust it for this topic: “I may not know how to define Cyber Warfare; and perhaps I never will, but I know it when I see it.”
How I see it, “Cyberspace” is the theater of computer instructions (code) and information (data). “Warfare” is the strategies and tactics of one side using all available resources to achieve power and financial wealth while the other side uses all their available resources to protect their existing power and financial wealth. Cyber warfare is the control of both code and data to achieve/defend power and financial wealth.
The authors presented a very informative strategy and power comparison section between physical versus virtual fronts and how they relate to the Principles of War, the DIME factors and the types of national power. The conclusio
I drew was that century old strategies still need to be kept in place; the weapons themselves will not be “Weapons of Mass Destruction”, but rather “Weapons of Mass Disruption” to the civilian population, and that safeguards could morph into monitor and control.
Presidents Bush and Obama both announced initiatives, directives, reports and czars. However, very little headway has been made, especially when the evening news reports another government agency hacked using malware infused emails, the release of confidential documents, the hacking of government smartcards, security protocols released and so on. And while there may not be an actual Declaration of Cyber War there certainly been enough probes, skirmishes and terrorists activities to elevate a cyber DEFCON level to 3.
This first chapter set up some good ground rules and understanding of the political problems from first defining cyber warfare to managing it. It also raised questions in my mind on whether a cyber-attack on the private versus public sectors can also constitute as an act of war. How does one deal with Weapons of Mass Disruption when imposed by a government onto its own people? If a citizen within a country attacks another country, how will both countries treat the incident? Is Cyber warfare the government’s excuse to implement a National ID? While these questions might be disturbing, I am excited to read this book and find out if these conce
s are addressed.
Be sure to visit again to see what I learn.
Article author
About the Author
Dovell Bonnett has been creating security solutions for computer users for over 20 years. In order to provide these solutions to consumers as directly, and quickly, as possible, he founded Access Smart. With each of his innovations, the end user — the person sitting in front of a computer — is his No. 1 customer.
This passion, as he puts it, to “empower people to manage digital information in the digital age” also led him to write the popular Online Identity Theft Protection for Dummies. Within the pervasive nature of our e-commerce and e-business community, personal information, from credit card numbers to your pet’s name, is more easily accessed, and identity theft and fraud has become an issue that touches every consumer.
Mr. Bonnett’s solutions reduce security risks for individual users, small businesses and large corporations. His professional experience spans 21 years in engineering, product development, sales and marketing, with more than 15 years focused specifically on smartcard technology, systems and applications. Mr. Bonnett has spent most of his smartcard career translating and integrating technology components into end-user solutions designed to solve business security needs and incorporating multi-applications onto a single credential using both contactless and contact smartcards. He has held positions at National Semiconductor, Siemens (Infineon), Certicom, Motorola and HID. He is the author of smartcard articles, regularly presents at conferences, and helps companies successfully implement smartcard projects. Mr. Bonnett has been an active member of the Smart Card Alliance contributing to the development of physical access security white papers. He holds dual bachelor’s degrees in industrial and electrical engineering from San Jose State University.
Further reading
Further Reading
Article
Students Beware! Identity thieves are studying you!
It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...
Related piece
Article
Things to consider when trying to get out of debt!
On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...
Related piece
Article
Passwords Don't Have to Threaten Business Security
The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.
Related piece
Article
5 Mistakes to Avoid when Dealing with a Debt Collector
Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner
Related piece