"Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat--from the threats of
Cyber warfare : a reference handbook
โ Scribed by Springer, Paul J
- Publisher
- ABC-CLIO
- Year
- 2015
- Tongue
- English
- Leaves
- 340
- Series
- Contemporary world issues
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.
โข Incorporates expertise from diverse viewpoints from the military, government agencies, industry, and academia
โข Provides an informative timeline of key events in the development of cyber warfare capabilities
โข Highlights the most prominent and effective cyber attacks in history as well as legal attempts to curb them
โฆ Table of Contents
Content: Background and history --
Problems, controversies, and solutions --
Perspectives --
Profiles --
Documents --
Resources --
Chronology. 1. Background and history. Information as a tool of war
The role of communications in modern warfare
Early attempts at encryption
Direct observation techniques
The creation of cyberspace
The cyber attacks begin
Cyber enabling in the nuclear Middle East
Preparations for infrastructure cyber attacks
Russian hacktivists and national pride
The Chinese approact to irregular warfare
The current state of cyber war
References --
2. Problems, controversies, and solutions. Is a cyber war possible?
Cyber as a military domain
Cyber strategy
Instruments of national power
Cyber crime, cyber espionage, cyberterrorism
The problem of attribution
People and paranoia
Cyber ethics
References --
3. Perspectives. Escalation in cyberspace: Martin Libicki
Training tomorrow's cyber warriors: Nicholas Michael Sambaluk
Cyber warfare in the professional military education system: S. Michael Pavelec
Waging e-jihad: Heidi L. Dexter
The relationship between space and cyber assets: Brian Tannehill
References --
4. Profiles. Alexander, Keith B.
Alperovitch, Dmitri
Anonymous
Carpenter, Shawn
Carr, Jeffrey
Clarke, Richard Alan
Defense Advanced Research Projects Agency (DARPA)
Defense Information Systems Agency (U.S.)
FireEye, Inc.
Google, Inc.
Hayden, Michael
Kaspersky, Yevgeniy "Eugene" Valentinovich
Libicki, Martin
Mandiant
McAfee, Inc.
Microsoft Corporation
Mitnick, Kevin
National Security Agency
NATO Cooperative Cyber Defence Centre of Excellence
People's Liberation Army Unit 61398 (China)
Qiao Liang and Wang Xiangsui
RAND Corporation
Rogers, Michael S.
Russian Business Network (RBN)
Snowden, Edward
Symantec Corporation
Syrian Electronic Army
Tenenbaum, Ehud "Udi"
U.S. Cyber Command
WikiLeaks
References --
5. Documents. Excerpts from the North Atlantic Treaty (1949)
Remarks of President Barack Obama on securing the nation's cyber infrastructure, Washington, D.C., May 29, 2009
Excerpts of Secretary of State Hillary Clinton on internet freedom, Washington, D.C., January 21, 2010
Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010
Excerpts of "International Strategy for Cyberspace," May 2011
Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012
Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: "Resilient military systems and the advanced cyber threat," January 2013
Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013 --
6. Resources. Print resources
Nonprint resources --
7. Chronology.
โฆ Subjects
Cyberspace operations (Military science) Cyberspace -- Security measures -- History. Cyberterrorism -- Prevention. Computer crimes -- Prevention.
๐ SIMILAR VOLUMES
Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is
Cyber warfare, meaning interstate cyber aggression, is an increasingly important emerging phenomenon in international relations, with state-orchestrated (or apparently state-orchestrated) computer network attacks occurring in Estonia (2007), Georgia (2008) and Iran (2010). <br>This method of waging
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cybe
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments.;Cover; Title Page; Copyright Page; Dedication Page; Table of Contents; Acknowledgments; Chapter 1: The Transformation of Cyber