Narrow your search
Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses
Authors: ---
ISBN: 1614995281 9781614995289 1614995273 9781614995272 Year: 2015 Publisher: Amsterdam, Netherlands : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The evolution of cyber war
Author:
ISBN: 1612347762 1612347746 9781612347769 9781612347745 9781612347639 1612347630 9781612347752 Year: 2015 Publisher: Lincoln

Loading...
Export citation

Choose an application

Bookmark

Abstract

"In January 2014 Pope Francis called the Internet a "gift from God." Months later former Secretary of Defense, Leon Panetta, described cyber warfare as "the most serious threat in the 21st century," capable of destroying our entire infrastructure and crippling the nation. Already, cyber warfare has impacted countries around the world: Estonia in 2007, Georgia in 2008, and Iran in 2010; and, as with other methods of war, cyber technology has the ability to be used not only on military forces and facilities, but on civilian targets.Our computers have become spies and tools for terrorism, and a have allowed for a new, unchecked method of war .And yet, cyber warfare is still in its infancy, with inumerable possibilities and contingencies for how such a war may play out in the coming decades. Cyber War Taboo?: The Evolution of Norms for Emerging-Technology Weapons, from Chemical Weapons to Cyber Warfare examines the international development of constraining norms for cyber warfare and predicts how those norms will unfold in the future. Using case studies for other emerging-technology weapons--chemical and biological weapons, strategic bombing, and nuclear weapons--author Brian Mazanec expands previous definitions of norm evolution theory and offers recommendations for citizens and U.S. policymakers and as they grapple with the impending reality of cyber war"--


Book
2015 7th International Conference on Cyber Conflict, Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
Authors: ---
ISBN: 9949954428 147998812X 9949954436 Year: 2015 Publisher: Piscataway, New Jersey : Institute of Electrical and Electronics Engineers,


Book
Cyber war versus cyber realities
Authors: ---
ISBN: 0190204818 0190204826 019020480X 9780190204808 9780190204792 0190204796 Year: 2015 Publisher: Oxford New York

Loading...
Export citation

Choose an application

Bookmark

Abstract

"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--


Book
Cyberwar : law and ethics for virtual conflicts
Authors: --- ---
ISBN: 0191787043 Year: 2015 Publisher: Oxford : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber warfare has become more pervasive and more complex in recent years. It is difficult to regulate, as it holds an ambiguous position within the laws of war. This book investigates the legal and ethical ramifications of cyber war, considering which sets of laws apply to it, and how it fits into traditional ideas of armed conflict.


Book
The defender's dilemma
Authors: --- --- ---
ISBN: 0833091034 0833089110 9780833091031 9780833091017 0833091018 9780833091024 0833091026 9780833089113 Year: 2015 Publisher: Santa Monica, Calif. RAND

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber security is a constant, and, by all accounts growing, challenge. This report, the second in a multi-phase study on the future of cyber security, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.


Book
New media politics
Author:
ISBN: 9781443883160 1443883166 9781443877107 1443877107 Year: 2015 Publisher: Newcastle-upon-Tyne

Loading...
Export citation

Choose an application

Bookmark

Abstract

New Media Politics: Rethinking Activism and National Security in Cyberspace explores many of the questions surrounding the new challenges that have arisen as a result of the emergence of cyberspace, including cyber-activism, cyberterrorism, and cyber-security. The chapters in this volume provide case studies that span an array of geographies as they debate questions regarding conceptual issues in cyberspace and the relationship between politics, cyberterrorism and cyber-activism, as well as state and international regulations concerning cyberspace, resistance movements in cyberspace, and media


Book
Borderless wars : civil military disorder and legal uncertainty
Author:
ISBN: 131646881X 1316271552 1316467066 1107109345 1107521505 9781107521506 Year: 2015 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In 2011, Nasser Al-Awlaki, a terrorist on the US 'kill list' in Yemen, was targeted by the CIA. A week later, a military strike killed his son. The following year, the US Ambassador to Pakistan resigned, undermined by CIA-conducted drone strikes of which he had no knowledge or control. The demands of the new, borderless 'gray area' conflict have cast civilians and military into unaccustomed roles with inadequate legal underpinning. As the Department of Homeland Security defends against cyber threats and civilian contractors work in paramilitary roles abroad, the legal boundaries of war demand to be outlined. In this book, former Under Secretary of the Air Force Antonia Chayes examines these new 'gray areas' in counterinsurgency, counter-terrorism and cyber warfare. Her innovative solutions for role definition and transparency will establish new guidelines in a rapidly evolving military-legal environment.


Book
Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles
Authors: ---
ISBN: 083309338X 0833089005 9780833093387 9780833089007 Year: 2015 Publisher: Santa Monica, Calif. RAND

Loading...
Export citation

Choose an application

Bookmark

Abstract

"There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Provided by publisher.

Keywords

Computer networks --- Cyberinfrastructure --- Cyberspace --- Risk assessment --- Cyberterrorism --- National security --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Evaluation --- Prevention --- Computer security --- National security policy --- NSP (National security policy) --- Security policy, National --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Analysis, Risk --- Assessment, Risk --- Risk analysis --- Risk evaluation --- Cyber-based information systems --- Cyber-infrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Government policy --- Economic policy --- International relations --- Military policy --- Computer crimes --- Terrorism --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Electronic terrorism (Cyberterrorism) --- United States. --- Rules and practice. --- AF (Air force) --- Air Force (U.S.) --- U.S.A.F. (Air force) --- United States Air Force --- US Air Force --- USAF (Air force)


Book
Comprehensive approach as 'sine qua non' for critical infrastructure protection
Authors: --- ---
ISBN: 1614994781 9781614994787 Year: 2015 Publisher: Washington, District of Columbia : IOS Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The world in which we live is becoming ever more complex, both from the viewpoint of ensuring security, and also because of our level of dependence on technology, as represented by so-called critical infrastructure. Despite the efforts of national security entities in the national and international context, terrorist attacks will probably never be completely preventable. This makes it necessary to prepare the functioning of our systems for the occurrence of a terrorist attack so that they will operate quickly and effectively even in this type of crisis. This book presents the papers delivered

Listing 1 - 10 of 11 << page
of 2
>>
Sort by