Understanding Cybersecurity

Emerging Governance and Strategy
Rowman & Littlefield International (Verlag)
  • 1. Auflage
  • |
  • erschienen am 29. Januar 2018
  • |
  • 286 Seiten
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
978-1-78660-681-5 (ISBN)

1. Auflage
  • Englisch
  • London
  • |
  • Großbritannien
  • 0,75 MB
978-1-78660-681-5 (9781786606815)
178660681X (178660681X)
weitere Ausgaben werden ermittelt
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Table of contents
  • Preface
  • The Future of Things Cyber
  • Chapter One Internet Governance and National Security
  • Internet Governance and U.S. National Cyber Strategy
  • The Friendly Side of Cyber Conflict
  • Multistakeholders and Internet Governance
  • Critical Internet Resources and Infrastructure
  • The ICANN and the Current Internet Governance Structure
  • Internet Engineering Task Force: Stewards of TCP/IP
  • Global Challenges to the Status Quo
  • The (Potential) Tyranny of the International Telecommunications Union over Critical Internet Resources
  • Shadow â??DNSâ?? Rising
  • Conclusion
  • Notes
  • Chapter Two Managing Decentralized Cyber Governance: The Responsibility to Troubleshoot
  • Decentralized Governance of a Global System
  • Prohibition Regimes and International Security Governance
  • Prohibition in the Cyber Domain
  • Implementing Cyber Prohibition
  • The Responsibility to Troubleshoot
  • Coping with Unintended Consequences
  • Relationship to Responsibility to Protect
  • Implementing the Responsibility to Troubleshoot
  • Conclusion
  • Notes
  • Chapter Three Tragedy of the Cyber Commons?
  • Conceiving of the Cyber Commons
  • Governing the Cyber Commons
  • Size of Resource
  • Number of Users
  • Resource Unit Mobility
  • Importance of Resource to Users
  • Productivity of System
  • Predictability of System Dynamics
  • Leadership
  • Norms and Social Capital
  • Knowledge of the Resource and Its Users
  • Collective Choice Rules
  • Conclusions: Self-Governance in the Cyber Commons?
  • Notes
  • Chapter Four Rise of a Cybered Westphalian Age 2.0
  • The â??Westphalianâ?? Process
  • Practical Reinforcementâ??Borders Decrease the Ease of Cybered Offense
  • Virtual Bordersâ??Feasible, Comfortable, and Manageable
  • Emergent Virtual Borders
  • Cyber Command: The U.S. Model
  • Resuscitation of International Relations Theory and History
  • Conclusion
  • Notes
  • Chapter Five Blown to Bits: Chinaâ??s War in Cyberspace, Augustâ??September 2025
  • A Strategic Lens for East Asia
  • Asiaâ??s Cyber (In)Security Problem
  • Considering State Cyber Conflictâ??The China Scenario
  • Laying the Field of Battle: A Clue of Cyber War to Come
  • Lifting the Electronic Veil
  • Computer Krieg
  • U.S. Response
  • Cyber Warâ??s Role in the Trans-Asia War
  • Reflection on a Conflict that Wasnâ??t
  • Notes
  • Chapter Six Nuclear Lessons for Cybersecurity?
  • Cyberspace in Perspective
  • Learning from one Revolution to Another?
  • Some General Lessons
  • Strategy for a New Technology Will Lack Adequate Empirical Content
  • New Technologies Raise New Issues in Civilâ??Military Relations
  • Civilian Uses Will Complicate Effective National Security Strategies
  • International Cooperation Lessons
  • Learning Can Lead to Concurrence in Beliefs without Cooperation
  • Learning Is Often Lumpy and Discontinuous
  • Learning Occurs at Different Rates in Different Issues of a New Domain
  • Involve the Military in International Contacts
  • Deterrence Is Complex and Involves More Than Just Retaliation
  • Begin Arms Control with Positive-Sum Games Related to Third Parties
  • Conclusion
  • Notes
  • Chapter Seven Escalation Dynamics and Conflict Termination in Cyberspace
  • Terminology and Basic Concepts
  • Attribution
  • The Need for Intelligence Support
  • Active Defense
  • Evolving or Escalating Conflict
  • Crisis Stability
  • Signaling Intentions in Cyber Conflict
  • Determining the Impact and Magnitude of Cyber Response
  • Transparency and Confidence-Building Measures
  • Catalytic Cyber Conflict
  • Complications Introduced by Patriotic Hackers
  • Incentives for Self-Restraint in Escalation
  • De-escalation and Conflict Termination
  • Kinetic Escalation
  • The Political Side of Escalation
  • The Future of Escalation Dynamics
  • Notes
  • Chapter Eight The Specter of Nonobvious Warfare
  • When Is Warfare Nonobvious?
  • Types of Nonobvious Warfare
  • Cyber Warfare
  • Space Warfare
  • Electronic Warfare
  • Drones
  • Special Operators, Saboteurs, and Assassins
  • Proxy Attacks
  • Attacks Using Weapons of Mass Destruction
  • Intelligence Support to Combat Operations
  • The Uses of Nonobvious Warfare
  • The Targetâ??s Response Options
  • Assessment and Conclusions
  • Notes
  • Chapter Nine Act and Actor Attribution in Cyberspace: A Proposed Analytic Framework
  • Defining Attribution
  • The Basic Legal Framework
  • Actor Attribution
  • Act Attribution
  • The Importance of Attribution
  • The Difficulty of Conclusive Attribution
  • An Analytic Model for Actor and Act Attribution
  • Quadrant 1: Low Actor Attribution Confidence/Low Degree of Harm
  • Quadrant 2: High Actor Attribution Confidence/Low Degree of Harm
  • Quadrant 3: Low Actor Attribution Confidence/High Degree of Harm
  • Quadrant 4: High Actor Attribution Confidence/High Degree of Harm
  • Two Cases Briefly Examined
  • Conclusion and Recommendations
  • Notes
  • Chapter Ten Strengthening Privateâ??Public Partnerships in National Cybersecurity
  • The Current Strategy
  • The Evolution of U.S. Government Policy
  • The Emerging Threat Matrix
  • Legal Hurdles to Cooperation
  • Antitrust
  • Privacy and Confidentiality
  • Robust Privateâ??Public Partnerships
  • Joint Planning
  • Incentives for New Partnerships
  • Who Defends Private Industry against Cyber Attack?
  • Balancing Public and Private Interests in Allocating Cost and Sharing Information
  • Conclusion
  • Notes
  • Bibliography
  • Index
  • About the Contributors

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)


Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.

Download (sofort verfügbar)

40,49 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok