Russian Cyber Operations
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Scott Jasper. Russian Cyber Operations
RUSSIAN CYBER OPERATIONS
Contents
Illustrations
Foreword
Acknowledgments
Abbreviations
Introduction. Below the Threshold
Conceptual Foundations
Book Overview
Notes
CHAPTER 1. Analytical Framework
Act of War
Legal Regimes
Technical Means
Framework Application
Ukraine Power Grid
Conclusion
Notes
CHAPTER 2. Asymmetric Arsenal Tool
Asymmetric Approach
Strategy and Doctrine
Cyber Coercion
2007 Estonia Assault
Cyber Warfare
2008 Georgian Invasion
Investment Trends
Conclusion
Notes
CHAPTER 3. Hybrid Warfare Element
Western Conception
Gerasimov Doctrine
2014 Crimean Incursion
Russian Perspectives
Donbass Intervention
Conclusion
Notes
CHAPTER 4. Information Warfare Component
Information Concepts
Influence Operations
2016 US Presidential Election
Political Warfare
Conclusion
Notes
CHAPTER 5. Rational State Behavior
International Norms
Pseudo Ransomware
NotPetya Campaign
Defense of Sovereignty
National Interest Pursuit
Norm-Compliance Options
New Round of Talks
Narrowly Tailored Deals
Latest Developments
Conclusion
Notes
CHAPTER 6. Unconvincing Responses
Deterrence Theories
Subdued Reaction
2017 French Presidential Election
Name and Shame
Economic Sanctions
Legal Indictments
Coercive Diplomacy
Military Action
Conclusion
Notes
CHAPTER 7. Current Security Strategies
Risk Management
Risk Management Framework
Cybersecurity Framework
Defense-in-Depth Strategies
Cyber Kill Chain
Intrusion Kill Chain
Center for Internet Security Controls
Shared Cyber-Threat Intelligence
Kill Chain Analysis
US Energy Sector Attacks
Suggested Strategy Shortfalls
Conclusion
Notes
CHAPTER 8. Automated Cyber Defense
Resilience Theories
Tactics and Techniques
New Investments
Security Operations Automation
Endpoint Detection and Response
Quasi Ransomware
Bad Rabbit Campaign
Security Operating Platform
Conclusion
Notes
CHAPTER 9. Technical Offset Strategy
Continued Confrontation
Unclear Norms
Offset Technologies
Data-Correlation Technologies
Deep-Learning Machines
Human-Machine Teaming
Conclusion
Notes
Conclusion. A Different Approach
Legal Ambiguity
Technical Complexity
More Aggressive Strategy
Concluding Considerations
Notes
Index
About the Author
Отрывок из книги
RUSSIAN CYBER OPERATIONS
Conflict and Cooperation in the Global Commons: A Comprehensive Approach for International Security edited by Scott Jasper
.....
47.Schmitt, Tallinn Manual 2.0, 21.
48.Schmitt, 22.
.....