Cyberwarfare: Information Operations in a Connected World, Second Edition
- 8h 59m
- David Seidl, Mike Chapple
- Jones and Bartlett Learning
- 2022
Cyberwarfare: Information Operations in a Connected World, Second Edition puts students on the real-world battlefield of cyberspace! The text covers the role of cyberwarfare in modern military operations, where it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered--from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare, its interaction with military doctrine, and Pandora's box opened by recent events, which have set the stage for future cyber attacks.
Features and Benefits
- Available with new Cybersecurity Cloud Labs, which provide immersive mock IT infrastructures where students can learn and practice foundational cybersecurity skills
- Updated military doctrine and cyber operations
- Additional coverage of hacking social networks to harvest data and influence though
- Additional coverage of IOT and emerging technologies
- Incorporates hands-on activities, relevant examples, and realistic exercises to prepare readers for their future careers
- Examines the importance of information as a military asset, from the days of Sun Tzu and Julius Caesar to the present
- Discusses cyberwarfare in light of the law of war and international conventions, and the new questions it is raising
- Reviews the various methods of attack used in recent years by both nation-state and nonstate actors
- Outlines strategies for defending endpoints, networks, and data
About the Author
Mike Chapple, PhD - Ph.D., CISSP, teaching Professor, University of Notre Dame
MIKE CHAPPLE, PhD, is teaching professor of information technology at the University of Notre Dame’s Mendoza College of Business. He previously served as Notre Dame’s Senior Director for IT Service Delivery, where he oversaw the information security function. In past positions, he served as both a consultant and an active duty Air Force officer. He is a technical editor for Information Security magazine and has written 25 other books, including the Security+ Study Guide, Information Security Illuminated, and the Official CISSP Study Guide. He earned his undergraduate and PhD degrees from Notre Dame in computer science and engineering. He also holds a master’s degree in computer science from the University of Idaho and an MBA from Auburn University.
David Seidl - Vice President for Information Technology and CIO, Miami University of Ohio
David Seidl is the Vice President for Information Technology and CIO at Miami University of Ohio. During his career, he has served in a variety of technical and information security roles including serving at the Senior Director for Campus Technology Services at the University of Notre Dame where he oversaw cloud operations, ERP, databases, identity management, and a broad range of other technologies and services. He also served as Notre Dame's Director of Information Security, led Notre Dame's information security program, and previously taught a popular course on networking and security for Notre Dame's Mendoza College of Business. David has written books on security certification and cyberwarfare including the Security+ Study Guide, The CYSA+ Study Guide, The Official (ISC)2 Practice Tests, and numerous other books. David holds a bachelor's degree in Communication Technology and a masters degree in Information Security from Eastern Michigan University, as well as CISSP, GPEN, GCIH, CSA+ , and Pentest+ certifications.
In this Book
-
Information as a Military Asset
-
Targets and Combatants
-
Cyberwarfare, Law, and Ethics
-
Intelligence Operations in a Connected World
-
The Evolving Threat—From Script Kiddies to Advanced Attackers
-
Social Engineering and Cyberwarfare
-
Weaponizing Cyberspace—A History
-
Nonstate Actors in Cyberwar
-
Defense-in-Depth Strategies
-
Cryptography and Cyberwar
-
Defending Endpoints
-
Defending Networks
-
Defending Data
-
Cyberwarfare and Military Doctrine
-
Pandora’s Box—The Future of Cyberwarfare
-
Glossary of Key Terms
-
References