What this book covers
Chapter 1: A Brief History of Cyber Threats and the Emergence of the APT Designator – This chapter will dive into the real history of cyber threats and their emergence in the space and provide some background on nation state APT designations.
Chapter 2: The Perimeter Is Dead – In this chapter, we'll go through all the intricacies and details that prove that the perimeter-based model of security failed years ago.
Chapter 3: Emerging Tactics and Trends – What Is Coming? – This chapter will be a journey down the rabbit hole into the future of cyber warfare tools and tactics and will provide examples of the new trends in this ever evolving space.
Chapter 4: Influence Attacks – Using Social Media Platforms for Malicious Purposes – In this chapter, we will cover the ways in which social media and influence can be weaponized for cyber warfare tactics.
Chapter 5: DeepFakes and AI/ML in Cyber Security – In this chapter, you will learn about the reality of AI and ML in cyber security and delve into the practical applications of these often-misunderstood technologies.
Chapter 6: Advanced Campaigns in Cyber Warfare – In this chapter, we will get into the types of attack campaigns and their real-world implications.
Chapter 7: Strategic Planning for Future Cyber Warfare – In this chapter, we will break down the specifics around how to better plan for cyber warfare and why strategy matters in digital combat.
Chapter 8: Cyber Warfare Strategic Innovations and Force Multipliers – This chapter is going to provide specific examples of what tools and technologies there are on the market that can help exponentially increase an organizations defensive posture.
Chapter 9: Bracing for Impact – In this chapter, you will be offered examples of how to apply tooling, tactics, and strategies to brace for the impact of a cyber attack and ways in which your organization can better respond when things go awry.
Chapter 10: Survivability in Cyber Warfare and Potential Impacts for Failure – In this chapter, we will cover essential ideas for defensive strategic planning and provide real-world examples of what may happen when cyber warfare tactics go big.
Appendix: Major Cyber Incidents Throughout 2019 – A list of recent major cyber incidents throughout 2019, categorized by the class of attack, as presented in Chapter 6.