𝔖 Scriptorium
✦   LIBER   ✦

📁

Strategic Cyber Security

✍ Scribed by Geers K.


Tongue
English
Leaves
169
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


NATO Cooperative Cyber Defence Centre of Excellence, 2011. 169 p.

This book argues that computer security has evolved from a technical discipline to a strategic concept. The world’s growing dependence on a powerful but vulnerable Internet – combined with the disruptive capabilities of cyber attackers – now threatens national and international security.
Strategic challenges require strategic solutions. The author examines four nation-state approaches to cyber attack mitigation: Internet Protocol version 6 (IPv6), Sun Tzu’s Art of War, Cyber attack deterrence, Cyber arms control.
The four threat mitigation strategies fall into several categories. IPv6 is a technical solution. Art of War is military. The third and fourth strategies are hybrid: deterrence is a mix of military and political considerations; arms control is a political/technical approach.
The Decision Making Trial and Evaluation Laboratory (DEMATEL) is used to place the key research concepts into an influence matrix. DEMATEL analysis demonstrates that IPv6 is currently the most likely of the four examined strategies to improve a nation’s cyber defense posture.
There are two primary reasons why IPv6 scores well in this research. First, as a technology, IPv6 is more resistant to outside influence than the other proposed strategies, particularly deterrence and arms control, which should make it a more reliable investment. Second, IPv6 addresses the most significant advantage of cyber attackers today – anonymity.
INTRODUCTION
Cyber Security and National Security
BIRTH OF A CONCEPT: STRATEGIC CYBER SECURITY
Cyber Security: A Short History
Cyber Security: A Technical Primer
Cyber Security: Real-World Impact
NATION-STATE CYBER ATTACK MITIGATION STRATEGIES
Next Generation Internet: Is IPv6 the Answer? Sun Tzu: Can Our Best Military Doctrine Encompass Cyber War?
Deterrence: Can We Prevent Cyber Attacks?
Arms Control: Can We Limit Cyber Weapons?
DATA ANALYSIS AND RESEARCH RESULTS
DEMATEL and Strategic Analysis
Key Findings
CONCLUSION
ISBN 978-9949-9040-7-5 (pdf)

✦ Subjects


Информатика и вычислительная техника;Информационная безопасность;Кибербезопасность и киберпреступления


📜 SIMILAR VOLUMES


Strategic Cyber Security Management
✍ Peter Trim, Yang-Im Lee 📂 Library 📅 2022 🏛 Routledge 🌐 English

<p><span>This textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to:</span></p><p><span>• evaluate different types of cyber risk</span></p><p><span>• carry out

Strategic Cyber Security Management
✍ Peter Trim, Yang-Im Lee 📂 Library 📅 2022 🏛 Routledge 🌐 English

<p><span>This textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to:</span></p><p><span>• evaluate different types of cyber risk</span></p><p><span>• carry out

Strategic Cyber Security Management
✍ Peter Trim, Yang-Im Lee 📂 Library 📅 2022 🏛 Routledge 🌐 English

<p><span>This textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to:</span></p><p><span>• evaluate different types of cyber risk</span></p><p><span>• carry out

Routledge Companion to Global Cyber-Secu
✍ Scott N. Romaniuk (editor), Mary Manjikian (editor) 📂 Library 📅 2021 🏛 Routledge 🌐 English

This companion provides the most comprehensive and up-to-date comparative overview of the cyber-security strategies and doctrines of the major states and actors in Europe, North America, South America, Africa, and Asia. The volume offers an introduction to each nation’s cyber-security strategy and p

Cyber Strategy: Risk-Driven Security and
✍ Carol A. Siegel, Mark Sweeney 📂 Library 📅 2020 🏛 Auerbach Publications 🌐 English

<span><p><strong>Cyber Strategy: Risk-Driven Security and Resiliency</strong> provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate pla

Cyber Strategy: Risk-Driven Security and
✍ Carol A. Siegel, Mark Sweeney 📂 Library 📅 2020 🏛 Auerbach Publications 🌐 English

<p><strong>Cyber Strategy: Risk-Driven Security and Resiliency</strong> provides a process and roadmap for any company to develop its unified Cybersecurity and Cyber Resiliency strategies. It demonstrates a methodology for companies to combine their disassociated efforts into one corporate plan with