Amazon cover image
Image from Amazon.com

Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman.

By: Contributor(s): Material type: TextTextSeries: What everyone needs to knowPublisher: Oxford : Oxford University Press, [2014]Copyright date: ©2014Description: 1 online resource (iii, 306 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780199918102
  • 0199918104
  • 1306081998
  • 9781306081993
Subject(s): Genre/Form: Additional physical formats: Print version:: Cybersecurity and cyberwar.DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 S562 2014eb
Other classification:
  • POL012000
Online resources:
Contents:
INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index.
Summary: A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Includes bibliographical references and index.

INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index.

A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of.

Print version record; online resource viewed February 9, 2021.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library