Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Cyber Warfare – Truth, Tactics, and Strategies

You're reading from   Cyber Warfare – Truth, Tactics, and Strategies Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

Arrow left icon
Product type Paperback
Published in Feb 2020
Publisher Packt
ISBN-13 9781839216992
Length 330 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Dr. Chase Cunningham Dr. Chase Cunningham
Author Profile Icon Dr. Chase Cunningham
Dr. Chase Cunningham
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. A Brief History of Cyber Threats and the Emergence of the APT Designator 2. The Perimeter Is Dead FREE CHAPTER 3. Emerging Tactics and Trends – What Is Coming? 4. Influence Attacks – Using Social Media Platforms for Malicious Purposes 5. DeepFakes and AI/ML in Cyber Security 6. Advanced Campaigns in Cyber Warfare 7. Strategic Planning for Future Cyber Warfare 8. Cyber Warfare Strategic Innovations and Force Multipliers 9. Bracing for Impact 10. Survivability in Cyber Warfare and Potential Impacts for Failure 11. Other Books You May Enjoy
12. Index
Appendix – Major Cyber Incidents Throughout 2019

Modem hacks

The first focused instances of computer threat research and exploitation studies actually began during the 1970s and were not even related to computers; they were instead noted as a problem in the telephone-switching network. The phone system was growing so fast and becoming so large that the system had to be integrated and automated to survive. This first automated phone system was built to serve a large test environment, and immediately many problems were discovered. Calls originated and ended on their own, phone numbers were allocated to persons without phones, and a myriad of other issues came to light.

These initial issues were not actually considered a threat as much as they were thought to be a problem for the owners of the systems and those administering the networks. In the 1980s, the modem became the powerhouse means of connecting and managing the large networks that were becoming more and more commonplace, and as such modems became the primary point of compromise from which systems could be hacked.

While there are many different opinions about the first real virus on a computer system, the reality of this becoming a problem for computers did not become prevalent in public literature until the computer became a household item in the mid-1980s. During the "age of modems," groups like the 414s, a group of modem hackers whose name came from their area code, were identified and arrested by the FBI (Hansman, 2003).

The 414 group targeted and exploited the phone networks and modems of Los Alamos National Laboratory and a center for cancer research, using a combination of malicious code and a deep understanding of the flaws in the automation technology that was used by the phone companies at that time. Not long after this first noted computer threat campaign was finalized, the federal government passed the Computer Crime and Abuse Act (CISPA 2010). This legislation detailed what constituted a protected computer and the resulting punishment for those who sought to conduct malicious actions against any protected system (Grance, Kent, & Kim, 2004).

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image