๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Cyber Arms: Security in Cyberspace

โœ Scribed by Stanislav Abaimov, Maurizio Martellini


Publisher
CRC Press
Year
2020
Tongue
English
Leaves
395
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure.

The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives.

โœฆ Table of Contents


Cover
Title Page
Copyright Page
Preface
Disclaimer
Contents
List of Figures and Tables
Abbreviations
Introduction
1. Cyber Offence Landscape
1.1 Cyber Arms Creation and Evolution
1.2 Cyber-Arms Industry
1.3 Cyberspace as a Military domain
2. Cyber Defence and Countermeasures
2.1 Information Security
2.2 Cyber Security as a Science
2.3 Vulnerabilities and Exploits
2.4 Defence from Selected Cyber Threats
2.5 CBRNe Cyber Security
2.6 Cyber Research and Defence Modelling
2.7 Cyber Arms Race and Control
2.8 Legal and Ethical Cyber Issues
2.9 National Security in Cyberspace
3. Future Challenges
3.1 Global Interconnectivity and Internet Dependence
3.2 Next Generation Cyber Attacks
3.3 Next Generation of Cyber-physical Weapons
3.4 Next Generation Warfare (Hybrid, 4GW)
3.5 Cyber Regulations
4. Conclusion
Glossary
Index


๐Ÿ“œ SIMILAR VOLUMES


Cyber Arms: Security in Cyberspace
โœ Stanislav Abaimov, Maurizio Martellini ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› CRC Press ๐ŸŒ English

<p>This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from p

Cyber Arms-Security in Cyberspace
โœ Stanislav Abaimov (Author); Maurizio Martellini (Author) ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› CRC Press

<p>This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from p

Cyber Persistence Theory: Redefining Nat
โœ Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Oxford University Press ๐ŸŒ English

<span>A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace.</span><span><br><br>Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In</span><span> Cyber Persistence Theory</span><span>, Michael P. Fischerkel

Cyber Persistence Theory: Redefining Nat
โœ Michael P. Fischerkeller; Emily O. Goldman; Richard J. Harknett ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Oxford University Press ๐ŸŒ English

A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue

Cyber Power: Crime, Conflict and Securit
โœ Solange Ghernaouti-Helie ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› EPFL Press,CRC Press ๐ŸŒ English

<P>Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-part

Cyber Persistence Theory: Redefining Nat
โœ Michael P. Fischerkeller, Emily O. Goldman, Richard J. Harknett ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Oxford University Press ๐ŸŒ English

<span>A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace.</span><span><br><br>Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In</span><span> Cyber Persistence Theory</span><span>, Michael P. Fischerkel