Cyberspace in peace and war /

"Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries def...

Full description

Saved in:
Main Author: Libicki, Martin C., (Author)
Format: EBOOK
Language:English
Published: Annapolis, Maryland : Naval Institute Press, [2016]
Series:Transforming war.
Subjects:
Online Access:Go to eBook
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 05813cam a2200577 i 4500
001 u978672
003 SIRSI
005 20190411064058.8
006 m d
007 cr |||||||||||
008 160801s2016 mdua ob 001 0 eng
010 |a  2016035110 
035 |a (Sirsi) o956379701 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d OCLCO  |d YDX  |d EBLCP  |d TEFOD  |d IDEBK  |d RECBK  |d OCLCO  |d IDB  |d OCLCQ  |d YDX  |d OCLCO  |d OCLCQ  |d MERUC  |d UPM  |d OCLCQ  |d OCLCA  |d IUL  |d OCLCF  |d INT  |d OCLCQ  |d N$T 
020 |a 1682470334  |q (electronic book) 
020 |a 9781682470336  |q (electronic bk.) 
020 |z 9781682470329  |q (hardcover ;  |q alkaline paper) 
020 |z 1682470326  |q (hardcover ;  |q alkaline paper) 
035 |a 2088201  |b (N$T) 
035 |a (OCoLC)956379701  |z (OCoLC)959148457  |z (OCoLC)959273538  |z (OCoLC)967846169  |z (OCoLC)973748960  |z (OCoLC)973794627  |z (OCoLC)984605953  |z (OCoLC)992953145 
037 |a FA8893F8-F432-4911-B99C-E53531998223  |b OverDrive, Inc.  |n http://www.overdrive.com 
042 |a pcc 
050 1 4 |a U163  |b .L519 2016 
049 |a MAIN 
100 1 |a Libicki, Martin C.,  |e author. 
245 1 0 |a Cyberspace in peace and war /  |c Martin C. Libicki. 
264 1 |a Annapolis, Maryland :  |b Naval Institute Press,  |c [2016] 
300 |a 1 online resource (xvi, 478 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
380 |a Bibliography 
490 1 |a Transforming War 
504 |a Includes bibliographical references and index. 
520 |a "Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses--leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure."--Provided by publisher. 
505 0 |a Title Page; Copyright; Contents; List of Illustrations; List of Acronyms and Abbreviations; Introduction; PART I. FOUNDATIONS; Chapter 1. Emblematic Attacks; Cybercrime and Other System Intrusions; The Advanced Persistent Threat; Distributed Denial-of-Service Attacks; Stuxnet and Other Destructive Attacks; Chapter 2. Some Basic Principles; Cyberwar and Cyberspace; How Hackers Work; Agoras and Castles; Most Cyberattacks Have Transitory Effects; Chapter 3. How to Compromise a Computer; Abuses by Authorized Internal Users; Abuses by Everyday External Users. 
505 8 |a Altered Instructions via Supply Chain AttackMalware; Chapter 4. The Search for Cybersecurity; Applications Are Often the Weak Links in the Security Chain; The Role of Input Filtering; The Role of Operating Systems; The Role of People; The Role of Cryptography; A Role for Firewalls?; The Role of Air-Gapping; Relationships among Machines, Systems, and Engineering; Mixing and Matching Security Actions; Measures and Countermeasures; What Could We Learn?; Chapter 5. Defending Against Attacks of High and of Broad Consequence; Attacks of High Consequence. 
505 8 |a Identifying Near-Catastrophes to Get Ahead of CatastrophesHedging to Deal with Exceptions to the Power-Law Rule; Scalability Influences How Well a Near-Catastrophe Predicts a Catastrophe; Attacks of Broad Consequence; Implications for Learning; Is Information Sharing a Panacea?; Chapter 6. What the Government Can and Cannot Do; First, Why Should the Government Do Anything?; What the Wise Men Recommended; Good Policies; Panaceas; Bad Ideas; On Using Extraordinary Incentives to Juice the Cybersecurity Workforce; Can Governments Cope with Surprise?; PART II. POLICIES. 
505 8 |a Chapter 7. What Should Be SecretThe Calculus; Denying an Adversary Something; Affecting Adversary Knowledge; Affecting Adversary Decisionmaking; Adverse to Us; Some Implications of Logical Classification Rules; The Importance of Aggregate Privacy; The Benefits of Discretion; Conclusions and Implications; Chapter 8. What Does China's Economically Motivated Cyberespionage Cost the United States?; What's at Stake?; How Much Trade Is at Issue?; Displaced U.S. Exports; Displaced Value Added by U.S. Corporations; Summary Calculations; Conclusions; Chapter 9. Return to Vendor. 
505 8 |a What Should the NSA Do About Zero Days?Retain or Return: Some Criteria; After How Long Should a Zero Day Be Returned to Vendor?; Irrelevant Considerations; Conclusions; Chapter 10. Cybersecurity Futures; Better Offense; A Larger Attack Surface; Better Defense; New Tools for Defense; A Three Mile Island in Cyberspace; Chapter 11. Operational Cyberwar; Possible Effects; Timing Cyberattacks; The Role of Surprise; Hiding the Attack to Facilitate Its Repetition; An Operational Cyberwar Scenario; Would China Use Operational Cyberwar the Same Way? 
588 0 |a Online resource; title from digital title page (viewed on July 05, 2017). 
590 |a Added to collection customer.56279.3 
650 0 |a Cyberspace operations (Military science) 
650 0 |a Cyberspace  |x Government policy. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Cyberterrorism  |x Prevention. 
830 0 |a Transforming war. 
856 4 0 |z Go to eBook   |u https://ejwl.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2088201 
596 |a 1 
999 |a U163 .L519 2016  |w LC  |c 1  |i 978672-1001  |l ONLINE  |m EJWL  |r Y  |s Y  |t ONLINE  |u 7/8/2019  |x EBOOK  |0 EBSCOACAD