Russian Cyber Operations. Scott Jasper

Чтение книги онлайн.

Читать онлайн книгу Russian Cyber Operations - Scott Jasper страница 3

Russian Cyber Operations - Scott Jasper

Скачать книгу

in installing, testing, and measuring on campus the robust solutions for cyber resilience described in this book.

      In addition, I would like to thank numerous industry experts for discussing and demonstrating their cybersecurity products. I want also to recognize the pertinent guidance from Don Jacobs and Hanna Greco in the organization and construction of this book. Finally, I want to thank my wife, Annie, who provided the inspiration to take on this field of study.

       Abbreviations

A2/AD antiaccess/area-denial
APT advanced persistent threat
CIA Central Intelligence Agency
CIS Center for Internet Security
CNSSP Committee on National Security Systems Policy
DDoS distributed denial of service
DHS Department of Homeland Security
DLL dynamic link library
DNC Democratic National Committee
DCCC Democratic Congressional Campaign Committee
DOD Department of Defense
EDR endpoint detection and response
EU European Union
FBI Federal Bureau of Investigation
FSB Federal Security Service
GDP gross domestic product
GGE Government Group of Experts on Information Security
GRU Main Intelligence Directorate
G7 Group of Seven
G20 Group of Twenty
HTTP Hypertext Transfer Protocol
ICS industrial control system
ICS-CERT Industrial Control System–Computer Emergency Response Team
ICT information and communication technology
IHL international humanitarian law
IO information operations
IoT Internet of Things
IP internet protocol
IRA Internet Research Agency
IT information technology
IW information warfare
MMS multimedia messaging service
NATO North Atlantic Treaty Organization
NIST National Institute of Standards and Technology
NSA National Security Agency
PDF Portable Document Format
PPD presidential policy directive
RMF Risk Management Framework
RT Russia Today
SAP State Armament Program
SCADA supervisory control and data acquisition
SIEM security information and event management
SMB Server Message Block
SMS short message service
SOAR security orchestration, automation, and response
SOC security operations center
SSH Secure Shell
UK United Kingdom
UN United Nations
URL Uniform Resource Locator
US-CERT United States Computer Emergency Response Team
VPN virtual private network
WMI Windows Management Instrumentation

       Introduction

      Below the Threshold

Скачать книгу