Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [186]

By Root 1238 0
Hosting for the World’s Largest Botnets

Russian Organized Crime and the Kremlin

9. Investigating Attribution

Using Open Source Internet Data

Background

What Is an Autonomous System Network?

Timeline of political events

Analysis

Alternate views

Team Cymru and Its Darknet Report

Using WHOIS

Caveats to Using WHOIS

10. Weaponizing Malware

A New Threat Landscape

StopGeorgia.ru Malware Discussions

SQL injection, blind SQL injection, and using BENCHMARK

Twitter as DDoS Command Post against Iran

Social Engineering

The Social Graph API

Channel Consolidation

An Adversary’s Look at LinkedIn

BIOS-Based Rootkit Attack

Malware for Hire

Anti-Virus Software Cannot Protect You

Targeted Attacks Against Military Brass and Government Executives

Research is the key to offensive capabilities

Delivery of targeted attacks

Command, control, and exfiltration of data

Why client-side 0day vulnerabilities can be so devastating

Protecting against 0day exploits

Defense in Depth

Using technologies such as MOICE and virtualization

Physical separation between data of varying sensitivity

11. The Role of Cyber in Military Doctrine

The Russian Federation

The Foundation for Effective Politics (FEP)

Chronicles of Information Warfare

Analysis

“Wars of the Future Will Be Information Wars”

Who is Alexandr Burutin?

The speech

Analysis

“RF Military Policy in International Information Security”

The paper

Creating a legend for a cyber attack

The Art of Misdirection

China Military Doctrine

Anti-Access Strategies

The 36 Stratagems

US Military Doctrine

12. A Cyber Early Warning Model

The Challenge We Face

Cyber Early Warning Networks

Building an Analytical Framework for Cyber Early Warning

Latent tensions

Cyber reconnaissance

Initiating event

Cyber mobilization

Cyber attack

Cases Studies of Previous Cyber Attacks

Case study: Cyber attacks against Georgia

Case study: GhostNet cyber espionage

Case study: Cyber attacks against Denmark

Lessons Learned

Defense Readiness Condition for Cyberspace

13. Advice for Policymakers from the Field

When It Comes to Cyber Warfare: Shoot the Hostage

The United States Should Use Active Defenses to Defend Its Critical Information Systems

Scenarios and Options to Responding to Cyber Attacks

Scenario 1

Option 1

Option 2

Option 3

Option 4

Scenario 2

Option 1

Option 2

Scenario 3

Option

Scenario 4

Option

In Summary

Whole-of-Nation Cyber Security

14. Conducting Operations in the Cyber-Space-Time Continuum

Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement

Social Networks: The Geopolitical Strategy of Russian Investment in Social Media

2005: A Turning Point

DST and the Kremlin

The Facebook Revolution

Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec

15. The Russian Federation: Information Warfare Framework

Russia: The Information Security State

Russian Government Policy

New Laws and Amendments

Government Structures

Russian Ministry of Defense

Administrative Changes

Electronic Warfare Troops

The Federal Service for Technical and Export Control (FSTEC)—Military Unit (Vch) 96010

5th Central Research and Testing Institute of the Russian Defense Ministry (5th TSNIII)—Military Unit (Vch) 33872

18th Central Research Institute of the Russian Defense Ministry (18th CRI MOD)—Military Unit (Vch) 11135

27th Central Research Institute of the Russian Defense Ministry (27th CRI MOD)—Military Unit (Vch) 01168

Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO)

Federal Security Service Information Security Center (FSB ISC)—Military Unit (Vch) 64829

Russian

Return Main Page Previous Page Next Page

®Online Book Reader