Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310247071
Publisher: Progressive Management Publication: August 22, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310247071
Publisher: Progressive Management
Publication: August 22, 2014
Imprint: Smashwords Edition
Language: English

This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it. Our belief it that learning is most effective when concepts under consideration can be aligned with already-existing understanding or knowledge. Cyber issues are inherently tough to explain in layman's terms. The future is always open and undetermined, and the numbers of actors and the complexity of their relations are too great to give definitive guidance about future developments. In this report, historical analogies, carefully developed and properly applied, help indicate a direction for action by reducing complexity and making the future at least cognately manageable.

The Cyber Analogies Project was launched in 2012 to assist U.S. Cyber Command in identifying and developing relevant historical, economic, and other useful metaphors that could be used to enrich the discourse about cyber strategy, doctrine, and policy. The intent of the project is to provide useful insights, both for those with little technical background in or direct connection to cyberwar and cyber security and for those whose job it is to think about the spectrum of cyber-related issues every day. The project was conceived and carried out to help very senior, busy, responsible people understand topics and issues that are fast-moving and dynamic, and have potentially great consequences for society, security, and world affairs.

The President has identified the cyber security threat as one of the most serious we face as a nation. Events in cyberspace continue to accelerate, as both nation-states and non-state actors seek to exploit asymmetrical advantages in this virtual domain. The risks and costs of failing to act skillfully and effectively are likely to be widespread, cascading, and almost surely highly disruptive. Many small-scale attacks can be—and are being— prevented; but a major, mass-disruptive attack is a growing possibility against which current defenses are inadequate.

Cyber Analogies * The Cyber Pearl Harbor * Applying the Historical Lessons of Surprise Attack to the Cyber Domain: The Example of the United Kingdom * The Cyber Pearl Harbor Analogy: An Attacker's Perspective * "When the Urgency of Time and Circumstances Clearly Does Not Permit...": Redelegation in Nuclear and Cyber Scenarios * Comparing Airpower and Cyberpower * Active Cyber Defense: Applying Air Defense to the Cyber Domain * The Strategy of Economic Warfare: A Historical Case Study and Possible Analogy to Contemporary Cyber Warfare * Silicon Valley: Metaphor for Cybersecurity, Key to Understanding Innovation War * The Offense-Defense Balance and Cyber Warfare

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it. Our belief it that learning is most effective when concepts under consideration can be aligned with already-existing understanding or knowledge. Cyber issues are inherently tough to explain in layman's terms. The future is always open and undetermined, and the numbers of actors and the complexity of their relations are too great to give definitive guidance about future developments. In this report, historical analogies, carefully developed and properly applied, help indicate a direction for action by reducing complexity and making the future at least cognately manageable.

The Cyber Analogies Project was launched in 2012 to assist U.S. Cyber Command in identifying and developing relevant historical, economic, and other useful metaphors that could be used to enrich the discourse about cyber strategy, doctrine, and policy. The intent of the project is to provide useful insights, both for those with little technical background in or direct connection to cyberwar and cyber security and for those whose job it is to think about the spectrum of cyber-related issues every day. The project was conceived and carried out to help very senior, busy, responsible people understand topics and issues that are fast-moving and dynamic, and have potentially great consequences for society, security, and world affairs.

The President has identified the cyber security threat as one of the most serious we face as a nation. Events in cyberspace continue to accelerate, as both nation-states and non-state actors seek to exploit asymmetrical advantages in this virtual domain. The risks and costs of failing to act skillfully and effectively are likely to be widespread, cascading, and almost surely highly disruptive. Many small-scale attacks can be—and are being— prevented; but a major, mass-disruptive attack is a growing possibility against which current defenses are inadequate.

Cyber Analogies * The Cyber Pearl Harbor * Applying the Historical Lessons of Surprise Attack to the Cyber Domain: The Example of the United Kingdom * The Cyber Pearl Harbor Analogy: An Attacker's Perspective * "When the Urgency of Time and Circumstances Clearly Does Not Permit...": Redelegation in Nuclear and Cyber Scenarios * Comparing Airpower and Cyberpower * Active Cyber Defense: Applying Air Defense to the Cyber Domain * The Strategy of Economic Warfare: A Historical Case Study and Possible Analogy to Contemporary Cyber Warfare * Silicon Valley: Metaphor for Cybersecurity, Key to Understanding Innovation War * The Offense-Defense Balance and Cyber Warfare

More books from Progressive Management

Cover of the book Operations of - and Challenges to - the Army Medical Department (AMEDD) During the U.S. - Mexican War, 1846-1848: Field Operations of Major Generals Winfield Scott and Zachary Taylor by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Civil Support Operations - Field Manual 3-28 - Domestic Disasters, WMD and CBRNE, Law Enforcement Support (Professional Format Series) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Army Theater Missile Defense Operations (FM 100-12) Ballistic and Cruise Missiles (Value-Added Professional Format Series) by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Thyroid Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Survivability on the Island of Spice: The Development of the UH-60 Blackhawk Helicopter and its Baptism of Fire in Operation Urgent Fury on Grenada - Effect of Poor Intelligence Flying into Enemy Fire by Progressive Management
Cover of the book Training to Fight: Training and Education During the Cold War - Pentomic Era, Korean War, Vietnam War, Top Gun Miramar, Coverage of Training Facilities Listed by State by Progressive Management
Cover of the book 21st Century FEMA Emergency Manager: An Orientation to the Position Study Course (IS-1) - Basic Emergency Management, Preparedness, Mitigation, EOC, Emergency Plans by Progressive Management
Cover of the book 21st Century Military Documents: Training for Full Spectrum Operations (Field Manual FM 7-0) - Changing the Army's Mindset, Army Training System, Mission Essential Task List, Train to Sustain by Progressive Management
Cover of the book 2015 Complete Guide to Pollinator Health: Honey Bees, Monarch Butterflies, New Strategies for Colony Collapse Disorder (CCD), Varroa Mite, Pesticides, Domestic and Global, Federal Land Practices by Progressive Management
Cover of the book The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups - Role of Counterinsurgency, Counterterrorism, Guerilla Warfare, Defense Strategy Implications by Progressive Management
Cover of the book 2012 People's Republic of China: Military and Security Developments Annual Report to Congress, People's Liberation Army (PLA), Space, Cyber Capabilities, Earlier Reports to 2006 by Progressive Management
Cover of the book The U.S. Air Force in Space 1945 to the Twenty-first Century: Recollections of General Schriever, Balancing Technology and Reliability, Cold War, Space Power, Persian Gulf War, Manned versus Unmanned by Progressive Management
Cover of the book 21st Century Cancer Sourcebook: Myelodysplastic / Myeloproliferative (MDS/MPN) Neoplasms, Chronic Myelomonocytic Leukemia (CMML), aCML, Juvenile Myelomonocytic Leukemia (JMML), MDS/MPN-UC by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Airfield and Flight Operations Procedures - FM 3-04.300 - Combined Arms, Construction, Airfield Operations Battalions (AOBS), Installation Flight Operations by Progressive Management
Cover of the book Army Correspondence Course: Unit Ministry Team (UMT) Crisis Counseling - The Chaplain Assistant's Role (Subcourse CH1313), plus Army Guide to the Prevention of Suicide and Self-Destructive Behavior by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy