Cyberspace in Peace and War

Nonfiction, History, Military, Other
Cover of the book Cyberspace in Peace and War by Martin Libicki, Naval Institute Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Martin Libicki ISBN: 9781682470336
Publisher: Naval Institute Press Publication: October 15, 2016
Imprint: Naval Institute Press Language: English
Author: Martin Libicki
ISBN: 9781682470336
Publisher: Naval Institute Press
Publication: October 15, 2016
Imprint: Naval Institute Press
Language: English
This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.). Although written from a U.S. perspective, most of its contents are globally relevant.

It is written essentially in four sections. The first (chapters 1 - 5) describes how compromises of computers and networks permit unauthorized parties to extract information from such systems (cyber-espionage), and/or to force these systems to misbehave in ways that disrupt their operations or corrupt their workings. The section examines notable hacks of systems, fundamental challenges to cybersecurity (e.g., the lack of forced entry, the measure-countermeasure relationship) including the role of malware, and various broad approaches to cybersecurity.

The second (chapters 6 - 9) describes what government policies can, and, as importantly, cannot be expected to do to improve a nation’s cybersecurity thereby leaving leave countries less susceptible to cyberattack by others. Among its focus areas are approaches to countering nation-scale attacks, the cost to victims of broad-scale cyberespionage, and how to balance intelligence and cybersecurity needs.
The third (chapters 10 - 15) looks at cyberwar in the context of military operations. Describing cyberspace as the 5th domain of warfare feeds the notion that lessons learned from other domains (e.g., land, sea) apply to cyberspace. In reality, cyberwar (a campaign of disrupting/corrupting computers/networks) is quite different: it rarely breaks things, can only be useful against a sophisticated adversary, competes against cyber-espionage, and has many first-strike characteristics.

The fourth (chapters 16 – 35) examines strategic cyberwar within the context of state-on-state relations. It examines what strategic cyberwar (and threats thereof) can do against whom – and how countries can respond. It then considers the possibility and limitations of a deterrence strategy to modulate such threats, covering credibility, attribution, thresholds, and punishment (as well as whether denial can deter). It continues by examining sub rosa attacks (where neither the effects nor the attacker are obvious to the public); the role of proxy cyberwar; the scope for brandishing cyberattack capabilities (including in a nuclear context); the role of narrative and signals in a conflict in cyberspace; questions of strategic stability; and norms for conduct in cyberspace (particularly in the context of Sino-U.S. relations) and the role played by international law.

The last chapter considers the future of cyberwar.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.). Although written from a U.S. perspective, most of its contents are globally relevant.

It is written essentially in four sections. The first (chapters 1 - 5) describes how compromises of computers and networks permit unauthorized parties to extract information from such systems (cyber-espionage), and/or to force these systems to misbehave in ways that disrupt their operations or corrupt their workings. The section examines notable hacks of systems, fundamental challenges to cybersecurity (e.g., the lack of forced entry, the measure-countermeasure relationship) including the role of malware, and various broad approaches to cybersecurity.

The second (chapters 6 - 9) describes what government policies can, and, as importantly, cannot be expected to do to improve a nation’s cybersecurity thereby leaving leave countries less susceptible to cyberattack by others. Among its focus areas are approaches to countering nation-scale attacks, the cost to victims of broad-scale cyberespionage, and how to balance intelligence and cybersecurity needs.
The third (chapters 10 - 15) looks at cyberwar in the context of military operations. Describing cyberspace as the 5th domain of warfare feeds the notion that lessons learned from other domains (e.g., land, sea) apply to cyberspace. In reality, cyberwar (a campaign of disrupting/corrupting computers/networks) is quite different: it rarely breaks things, can only be useful against a sophisticated adversary, competes against cyber-espionage, and has many first-strike characteristics.

The fourth (chapters 16 – 35) examines strategic cyberwar within the context of state-on-state relations. It examines what strategic cyberwar (and threats thereof) can do against whom – and how countries can respond. It then considers the possibility and limitations of a deterrence strategy to modulate such threats, covering credibility, attribution, thresholds, and punishment (as well as whether denial can deter). It continues by examining sub rosa attacks (where neither the effects nor the attacker are obvious to the public); the role of proxy cyberwar; the scope for brandishing cyberattack capabilities (including in a nuclear context); the role of narrative and signals in a conflict in cyberspace; questions of strategic stability; and norms for conduct in cyberspace (particularly in the context of Sino-U.S. relations) and the role played by international law.

The last chapter considers the future of cyberwar.

More books from Naval Institute Press

Cover of the book Lessons Not Learned by Martin Libicki
Cover of the book Battle Line by Martin Libicki
Cover of the book We Were Pirates by Martin Libicki
Cover of the book British and Commonwealth Warship Camouflage of WWII by Martin Libicki
Cover of the book An American Adventure by Martin Libicki
Cover of the book Airpower Reborn by Martin Libicki
Cover of the book The Battle for Britain by Martin Libicki
Cover of the book Lady in the Navy by Martin Libicki
Cover of the book Strategic Theories by Martin Libicki
Cover of the book Battleship Bismarck by Martin Libicki
Cover of the book Submarine Diary by Martin Libicki
Cover of the book Militant Islamist Ideology by Martin Libicki
Cover of the book U.S. Naval Institute on the Naval Academy: The Challenges by Martin Libicki
Cover of the book Old Glory Stories by Martin Libicki
Cover of the book Stephen Decatur by Martin Libicki
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy