Waging Cyber War: Technical Challenges and Operational Constraints, 1st Edition

  • Jacob G. Oakley
  • Published By: Apress
  • ISBN-10: 148424950X
  • ISBN-13: 9781484249505
  • DDC: 355.41
  • 192 Pages | eBook
  • Original Copyright 2019 | Published/Released February 2021
  • This publication's content originally published in print form: 2019

  • Price:  Sign in for price



This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from a technical standpoint. You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. It includes a detailed illustration of cyber warfare against the backdrop of national and international policy, laws, and conventions relating to war, and details technical resources and activities required by the cyber war fighter. Even non-technical readers will gain an understanding of how the obstacles encountered are not easily mitigated and the irreplaceable nature of many cyber resources; how cyber war is conducted; and why it shouldn't be waged. It explains how cyber warfare has been covered unrealistically, technically misrepresented, and misunderstood. The book will help you understand: the concept of warfare and how cyber fits into the war-fighting domain; what constitutes war and warfare and how cyber fits in that paradigm and vice versa; how policies to plan and conduct cyber warfare reflect a lack of understanding regarding the technical means and resources necessary to perform such actions; what it means to do cyber exploitation, attack, and intelligence gathering, when one is preferred over the other, and their specific values and impacts on each other; the need for, and challenges of, enemy attribution; how to develop and scope a target in cyber warfare; the concept of self-attribution: what it is, the need to avoid it, and its impact; what goes into establishing the access from which you will conduct cyber warfare against an identified target; how association affects cyber warfare; the need for resource resilience, control, and ownership; and the misconceptions and an illustrative analogy of why cyber warfare doesn't always work. For anyone curious about cyber warfare, those involved in cyber operations and cyber warfare, security practitioners and policy or decision makers, and anyone who uses computing devices.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Table of Contents.
About the Author.
About the Technical Reviewer.
1: Cyber and Warfare.
2: Legal Authority.
3: Cyber Exploitation.
4: Cyber-Attack.
5: Cyber Collection.
6: Enemy Attribution.
7: Targeting.
8: Access.
9: Self-Attribution.
10: Association.
11: Resource Resilience.
12: Control and Ownership.
13: Challenges.
14: Contemplation.