Follow by Email

Sunday, 24 May 2020

The Handbook of Cyber Wargames: Wargaming the 21st Century New book

Co-authored with Nick Drage, this is an exciting new handbook covering the emerging battles in cyber space.

Cyber security is one of the big challenges of the 21st century. Failure to meet the threat can have major consequences for the individual, a company, an NGO or a nation state. The cost of cyber crime is in the billions of pounds per year. Cyber wargames are an essential part of the training cycle, education and operational analysis needed to rise to meet this threat.

This handbook aims to fill a gap in the training for cyber-attacks and cyber warfare. By providing worked examples of different types of manual cyber wargame, including aims and objectives for each, it provides a basis for the reader to understand the potential range of games on offer. It also helps educate clients about the different types of cyber wargame available and can help them procure the right type of game in order to meet their needs.

Cyber wargaming combines two complex fields:  wargame design and cyber operations.  This handbook is full of examples of such manual games. It includes examples of:

     Network attack and defence exercises
    Committee games

    Company and state level games

    Example of a Matrix Game

    Analysing the cyber security space using Confrontation Analysis

    Media Wars: The Battle to Dominate the Information Space

    Attack Chain modelling
The book is full of additional information for the reader, such as how a cyber conflict might develop or what the key decisions C-Suite leaders need to consider when faced by a sustained cyber attack.

 

3 comments:

  1. I'm a professional inspirational book writer. I always publish my books by Grace Point Publishing. Because they are the best publishers for publishing inspirational books. You can visit their website to contact them.

    ReplyDelete
  2. I look forward to reading this and seeing we can apply it to international cyber capacity building projects. I have just reached out via LinkedIn. Thanks.

    ReplyDelete
  3. These security foundations require an understanding of the controls needed to protect the confidentiality, integrity, and availability of the information. cyber security training in hyderabad

    ReplyDelete