01234nas a2200109 4500000000100000008004100001260000900042100002200051245005800073856006600131520092700197 2022 d c20221 aJerry M. Couretas00aCyber Security and Defense for Analysis and Targeting uhttps://link.springer.com/chapter/10.1007/978-3-030-88559-5_63 aThe purpose of this chapter is to present a general background on cyber security and defense for analysis and targeting. We will begin with a description of current thinking on cyber security systems, including layered defense. This will be followed by a review of end points, connections, and key network nodes in terms of their vulnerabilities and possible technical tools to secure them. Included in this survey will be a review of the cyber attack cycle, a look at organized malware (e.g., botnets) construction and its detection, and a reflection on the importance of understanding defended network terrain in order to develop a successful network defense strategy. In addition, we will look at the broader context of cyber defense, and how we might incorporate conceptual security architecture approaches (e.g., denial and deception) in order to improve the likelihood of success in securing and defending a network.