Cybersecurity and cyberwar : what everyone needs to know / Peter W. Singer, Allan Friedman.Material type: TextSeries: What everyone needs to knowPublisher: New York : Oxford University Press, USA, Copyright date: ©2014Description: 1 online resource (1 volume)Content type: text Media type: computer Carrier type: online resourceISBN: 9780199918102; 0199918104; 1306081998; 9781306081993Subject(s): Computer security -- United States | Computer networks -- Security measures -- United States | Cyberspace -- Security measures -- United States | Cyberterrorism -- United States -- Prevention | Information warfare -- United States -- Prevention | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | POLITICAL SCIENCE -- Political Freedom & Security -- International Security | Information warfare -- Prevention | Cyberterrorism -- Prevention | Computer networks -- Security measures | Computer security | United States | Beveiliging | Internet | IT-säkerhet | Datanät -- säkerhetsaspekter | Cyberspace -- säkerhetsaspekter | Cyberterrorism -- prevention | Informationskrigföring | IW -- computers -- information technology -- communications -- security -- terrorism -- USAGenre/Form: Electronic books. Additional physical formats: Print version:: Cybersecurity and cyberwarDDC classification: 005.8 LOC classification: QA76.9.A25 | S562 2014ebOther classification: POL012000 Online resources: Click here to access online
|Item type||Current library||Collection||Call number||Status||Date due||Barcode||Item holds|
Print version record.
INTRODUCTION -- Why Write a Book about Cybersecurity and Cyberwar? -- Why Is There a Cybersecurity Knowledge Gap, and Why Does It Matter? -- How Did You Write the Book and What Do You Hope to Accomplish? -- PART I HOW IT ALL WORKS -- The World Wide What? Defining Cyberspace -- Where Did This "Cyber Stuff" Come from Anyway? A Short History of the Internet -- How Does the Internet Actually Work? -- Who Runs It? Understanding Internet Governance -- On the Internet, How Do They Know Whether You Are a Dog? Identity and Authentication -- What Do We Mean by "Security" Anyway? -- What Are the Threats? -- One Phish, Two Phish, Red Phish, Cyber Phish: What Are Vulnerabilities? -- How Do We Trust in Cyberspace? -- Focus: What Happened in WikiLeaks? -- What Is an Advanced Persistent Threat (APT)? -- How Do We Keep the Bad Guys Out? The Basics of Computer Defense -- Who Is the Weakest Link? Human Factors -- PART II WHY IT MATTERS -- What Is the Meaning of Cyberattack? The Importance of Terms and Frameworks -- Whodunit? The Problem of Attribution -- What Is Hactivism? -- Focus: Who Is Anonymous? -- The Crimes of Tomorrow, Today: What Is Cybercrime? -- Shady RATs and Cyberspies: What Is Cyber Espionage? -- How Afraid Should We Be of Cyberterrorism? -- So How Do Terrorists Actually Use the Web? -- What about Cyber Counterterrorism? -- Security Risk or Human Right? Foreign Policy and the Internet -- Focus: What Is Tor and Why Does Peeling Back the Onion Matter? -- Who Are Patriotic Hackers? -- Focus: What Was Stuxnet? -- What Is the Hidden Lesson of Stuxnet? The Ethics of Cyberweapons -- "Cyberwar, Ugh, What Are Zeros and Ones Good For?": Defining Cyberwar -- A War by Any Other Name? The Legal Side of Cyber Conflict -- What Might a "Cyberwar" Actually Look Like? Computer Network Operations -- Focus: What Is the US Military Approach to Cyberwar? -- Focus: What Is the Chinese Approach to Cyberwar? -- What about Deterrence in an Era of Cyberwar? -- Why Is Threat Assessment So Hard in Cyberspace? -- Does the Cybersecurity World Favor the Weak or the Strong? -- Who Has the Advantage, the Offense or the Defense? -- A New Kind of Arms Race: What Are the Dangers of Cyber Proliferation? -- Are There Lessons from Past Arms Races? -- Behind the Scenes: Is There a Cyber-Industrial Complex? -- PART III WHAT CAN WE DO? -- Don't Get Fooled: Why Can't We Just Build a New, More Secure Internet? -- Rethink Security: What Is Resilience, and Why Is It Important? -- Reframe the Problem (and the Solution): What Can We Learn from Public Health? -- Learn from History: What Can (Real) Pirates Teach Us about Cybersecurity? -- Protect World Wide Governance for the World Wide Web: What Is the Role of International Institutions? -- "Graft" the Rule of Law: Do We Need a Cyberspace Treaty? -- Understand the Limits of the State in Cyberspace: Why Can't the Government Handle It? -- Rethink Government's Role: How Can We Better Organize for Cybersecurity? -- Approach It as a Public-Private Problem: How Do We Better Coordinate Defense? -- Exercise Is Good for You: How Can We Better Prepare for Cyber Incidents? -- Build Cybersecurity Incentives: Why Should I Do What You Want? -- Learn to Share: How Can We Better Collaborate on Information? -- Demand Disclosure: What Is the Role of Transparency? -- Get "Vigorous" about Responsibility: How Can We Create Accountability for Security? -- Find the IT Crowd: How Do We Solve the Cyber People Problem? Do Your Part: How Can I Protect Myself (and the Internet)? -- CONCLUSIONS -- Where Is Cybersecurity Headed Next? -- What Do I Really Need to Know in the End? -- ACKNOWLEDGMENTS -- NOTES -- GLOSSARY -- INDEX.
A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of.
Includes bibliographical references and index.