{"id":159,"date":"2021-05-25T14:06:04","date_gmt":"2021-05-25T21:06:04","guid":{"rendered":"https:\/\/www.lunarip.com\/?p=159"},"modified":"2021-05-26T09:21:19","modified_gmt":"2021-05-26T16:21:19","slug":"cyberwarfare-introduction-to-information-age-conflict","status":"publish","type":"post","link":"https:\/\/www.lunarip.com\/index.php\/cyberwarfare-introduction-to-information-age-conflict\/","title":{"rendered":"Cyberwarfare: An Introduction to Information-Age Conflict"},"content":{"rendered":"\n
Cyberwarfare: An Introduction to Information-Age Conflict by Isaac Porche is published by Artech House 2020<\/p>\n\n\n\n
The book consisting of 13 chapters provides an introductory overview of cyberwarfare as an existing (and new) discipline. Chapter 1 introduces ‘Information and Conflict’ providing key definitions and concepts around:<\/p>\n\n\n\n
The DIKW framework is presented which consists of:<\/p>\n\n\n\n
This DIKW understanding is interesting both in the context of Information Warfare but I also find it a good framework to apply to personal viewpoints and analysis of Information and Operational Technology (IT and OT). <\/p>\n\n\n\n
In Chapter 2, the author introduces the lifecycle of a cyberattack, speaking of offensive cyber operations and the phases of identification of vulnerability access, gaining and maintaining access through a vulnerability and thirdly using access to deliver and execute a payload.<\/p>\n\n\n\n Within these attack phases, it should be noted that there is significant planning and preparation effort that is expended prior to the actual intrusion activity. <\/p>\n\n\n\n In Chapter 3, the author introduces Cyber Risk and it components (loss probability and the loss consequence)<\/p>\n\n\n\n Risk Assessement, Management, Mitigation and Quantative Analysis of risk are discussed with a final discussion of why risk analysis matters and how one should proceed with dealing with cyber risk.<\/p>\n\n\n\n In the next chapter the legal aspects of Cyber Warfare and Information Warfare and introduced with areas including:<\/p>\n\n\n\n Chapters 5-9 provides an overview\/introduction to: <\/p>\n\n\n\n These introductions are detailed and should be consumable by a general reader and will be common knowledge to most IT professionals. <\/p>\n\n\n\n Chapter 10 introduces Offensive Cyber operations by state actors providing definitions for strategy, tactics, techniques and procedures used in these operations. Background information is provided on the components that may up critical infrastructure within industry (Oil, Gas, Electrcity, Transport, Health, Water, Manufacturing and Pharmacuuticals) which typical have industrial processes that are driven using Industrial Control Systems (ICS). <\/p>\n\n\n\n Vulnerabilities, Attacks and Exploits of ICS are explored and the chapter provides a set of case studies that enumerates a number of attacks on ICS systems that are documented and reported in Open Source Intelligence and News sources. The attacked detailed include:<\/p>\n\n\n\n A brief treatment is also provided of some ransomware attacks including:<\/p>\n\n\n\n In Chapter 11, the author provides a detailed discussion of Tactics, Techniques and Procedures (TTP) for Offensive cyber operations including discussing the process of an expliotation of web applications. <\/p>\n\n\n\n Chapter 12 provides a discussion of cybersecurity in the maratine domain with Chaper 13 discussing cybersecurity in the US elections (2016)<\/p>\n\n\n\n Overall, this is a good introductory text on cyberwarfare which although published in 2020 will be in need of an update based on rapid evolution of events that have ocurred in 2020 and 2021, some areas that I believe that may be future subjects for Mr. Porsche to consider are: <\/p>\n\n\n\n <\/p>\n","protected":false},"excerpt":{"rendered":" Cyberwarfare: An Introduction to Information-Age Conflict by Isaac Porche is published by Artech House 2020 Introduction The book consisting of 13 chapters provides an introductory overview of cyberwarfare as an existing (and new) discipline. Chapter 1 introduces ‘Information and Conflict’ providing key definitions and concepts around: Information Networks and Technology Internet\/Web and the information age […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"hide_page_title":"","_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":""},"categories":[8],"tags":[31],"yoast_head":"\n
U.S. Department of Homeland Security and U.S. Department of Energy, Energy Sector- Specific Plan: An Annex to the National Infrastructure Protection Plan<\/em>, 2010, p. 124<\/figcaption><\/figure>\n\n\n\nCyber Risk<\/h2>\n\n\n\n
Legal Aspects of Cyber Warefare<\/h2>\n\n\n\n
Offensive Cyber Operations<\/h2>\n\n\n\n
Final Thoughs<\/h2>\n\n\n\n