Skip to main content

Posts

Showing posts from January, 2013

Book Review: “Cyber Warfare: Techniques, Tactics and Tools for the Security Practitioners" (2011)” by Jason Andress and Steve Winterfeld

Executive Summary
Cyber Warfare: Techniques, Tactics and Tools for the Security Practitioners is a consolidation of the current thinking around the topic of cyber warfare; not the way you hear about in the media where everything is a war of some kind (War on drugs, War on Terrorism, etc) but a discussion about what it means to conduct warfare via cyberspace. This is a tough topic because there are so many opinions about what Cyber Warfare is that you could literally spend an entire book just covering the definitions. The authors deftly avoid that trap and manage to provide a coherent line of thinking around Computer Network Operations even when these kinds of activities bump up against other cyberspace dangers like Cyber Crime, Cyber Hactavism, Cyber Espionage and Cyber Terrorism. This is a primer; a one stop shop to get you up to speed on the topic if you are new to it or a refresher even if you have been enmeshed in it for years. It is Cybersecurity Canon worthy and you should have …

Book Review: “Cyber War: The Next Threat to National Security and What to Do about It (2010)” by Richard Clarke and Robert Knake

Executive SummaryI recommend this book. It is essential to the cyber warrior who needs to understand the historical context around the evolution of defending any nation in cyber space. For international policy makers, it is a good place to start for a real discussion about substantive policies that the international community should consider. For the commercial security folks, read this book if you want insight into how government policy makers frame the problem and what they would want to implement if they could. Even if you do not agree with the policies, you will understand what they want. Clarke and Knake discusses the nature of cyber warfare, cyber espionage, cyber crime and cyber terrorism and provide specific examples of cyber warfare and cyber espionage.


ReviewSince 2009, a plethora of books have hit the market that discuss the issue of cyber warfare. Here are just a few:
Apr 2009: Cyberpower and National Security (National Defense University) by Franklin D. Kramer, Stuart H. St…

Book Review: “Breakpoint (2007)” by Richard Clarke

Executive Summary: If you like Michael Crichton stories like “Jurassic Park” and “State of Fear,” you will like this book. It is not a must-read for cyber security professionals, but it is an entertaining story that you can hand to your family members, friends and bosses to illustrate what could be done in cyber space by a well-resourced adversary. Along the way, you will learn a little about the ethical issues, pro and con, surrounding the Transhumanist Movement – the advocation of using performance enhancement technology to influence human evolution – and you will enjoy a rollercoaster of a ride as the heroes attempt to determine who the bad guys are and how to stop them. 

There is a lot to love in this novel. Richard Clark jams a boat-load of cutting edge cyber security ideas into this little Crichton-esque [1][2] political thriller. He wrote it in 2007 but set it in the near future of 2012 and when I say there is a boat-load of information, I am talking about yacht-sized, not dingy…