000 06313cam a2200457Ii 4500
001 ocn864907720
003 OCoLC
005 20240726105434.0
008 131210t20142014nyua ob 001 0 eng d
040 _aNT
_beng
_erda
_epn
_cNT
_dE7B
_dYDXCP
_dCCO
_dNT
_dOCLCO
_dOCLCQ
_dIDEBK
_dEBLCP
_dMHW
_dMEAUC
_dAUD
_dDEBSZ
_dMOR
_dZ5A
_dMERUC
_dOCLCQ
_dSAV
_dOCLCA
_dZEM
_dOCLCA
_dBAL
_dUUM
_dYDX
_dCEF
_dOCLCQ
_dINT
_dSTF
_dOCLCQ
_dWYU
_dTKN
_dAGLDB
_dOCL
_dG3B
_dIGB
_dAUW
_dBTN
_dINTCL
_dSNK
_dDKC
_dOCLCQ
_dNJT
_dOCLCQ
_dTFW
020 _a9780199918102
_q((electronic)l(electronic)ctronic)
020 _a9781306081993
043 _an-us---
050 0 4 _aQA76
_b.C934 2014
049 _aMAIN
100 1 _aSinger, P. W.
_q(Peter Warren),
_e1
245 1 0 _aCybersecurity and cyberwar :
_bwhat everyone needs to know /
_cP.W. Singer and Allan Friedman.
260 _aOxford :
_bOxford University Press,
_c(c)2014.
300 _a1 online resource (iii, 306 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
490 1 _aWhat everyone needs to know
504 _a2
505 0 0 _aINTRODUCTION --
_tWhy Write a Book about Cybersecurity and Cyberwar? --
_tWhy Is There a Cybersecurity Knowledge Gap, and Why Does It Matter? --
_tHow Did You Write the Book and What Do You Hope to Accomplish? --
_tPART I HOW IT ALL WORKS --
_tThe World Wide What? Defining Cyberspace --
_tWhere Did This "Cyber Stuff" Come from Anyway? A Short History of the Internet --
_tHow Does the Internet Actually Work? --
_tWho Runs It? Understanding Internet Governance --
_tOn the Internet, How Do They Know Whether You Are a Dog? Identity and Authentication --
_tWhat Do We Mean by "Security" Anyway? --
_tWhat Are the Threats? --
_tOne Phish, Two Phish, Red Phish, Cyber Phish: What Are Vulnerabilities? --
_tHow Do We Trust in Cyberspace? --
_tFocus: What Happened in WikiLeaks? --
_tWhat Is an Advanced Persistent Threat (APT)? --
_tHow Do We Keep the Bad Guys Out? The Basics of Computer Defense --
_tWho Is the Weakest Link? Human Factors --
_tPART II WHY IT MATTERS --
_tWhat Is the Meaning of Cyberattack? The Importance of Terms and Frameworks --
_tWhodunit? The Problem of Attribution --
_tWhat Is Hactivism? --
_tFocus: Who Is Anonymous? --
_tThe Crimes of Tomorrow, Today: What Is Cybercrime? --
_tShady RATs and Cyberspies: What Is Cyber Espionage? --
_tHow Afraid Should We Be of Cyberterrorism? --
_tSo How Do Terrorists Actually Use the Web? --
_tWhat about Cyber Counterterrorism? --
_tSecurity Risk or Human Right? Foreign Policy and the Internet --
_tFocus: What Is Tor and Why Does Peeling Back the Onion Matter? --
_tWho Are Patriotic Hackers? --
_tFocus: What Was Stuxnet? --
_tWhat Is the Hidden Lesson of Stuxnet? The Ethics of Cyberweapons --
_t"Cyberwar, Ugh, What Are Zeros and Ones Good For?": Defining Cyberwar --
_tA War by Any Other Name? The Legal Side of Cyber Conflict --
_tWhat Might a "Cyberwar" Actually Look Like? Computer Network Operations --
_tFocus: What Is the US Military Approach to Cyberwar? --
_tFocus: What Is the Chinese Approach to Cyberwar? --
_tWhat about Deterrence in an Era of Cyberwar? --
_tWhy Is Threat Assessment So Hard in Cyberspace? --
_tDoes the Cybersecurity World Favor the Weak or the Strong? --
_tWho Has the Advantage, the Offense or the Defense? --
_tA New Kind of Arms Race: What Are the Dangers of Cyber Proliferation? --
_tAre There Lessons from Past Arms Races? --
_tBehind the Scenes: Is There a Cyber-Industrial Complex? --
_tPART III WHAT CAN WE DO? --
_tDon't Get Fooled: Why Can't We Just Build a New, More Secure Internet? --
_tRethink Security: What Is Resilience, and Why Is It Important? --
_tReframe the Problem (and the Solution): What Can We Learn from Public Health? --
_tLearn from History: What Can (Real) Pirates Teach Us about Cybersecurity? --
_tProtect World Wide Governance for the World Wide Web: What Is the Role of International Institutions? --
_t"Graft" the Rule of Law: Do We Need a Cyberspace Treaty? --
_tUnderstand the Limits of the State in Cyberspace: Why Can't the Government Handle It? --
_tRethink Government's Role: How Can We Better Organize for Cybersecurity? --
_tApproach It as a Public-Private Problem: How Do We Better Coordinate Defense? --
_tExercise Is Good for You: How Can We Better Prepare for Cyber Incidents? --
_tBuild Cybersecurity Incentives: Why Should I Do What You Want? --
_tLearn to Share: How Can We Better Collaborate on Information? --
_tDemand Disclosure: What Is the Role of Transparency? --
_tGet "Vigorous" about Responsibility: How Can We Create Accountability for Security? --
_tFind the IT Crowd: How Do We Solve the Cyber People Problem? Do Your Part: How Can I Protect Myself (and the Internet)? --
_tCONCLUSIONS --
_tWhere Is Cybersecurity Headed Next? --
_tWhat Do I Really Need to Know in the End? --
_tACKNOWLEDGMENTS --
_tNOTES --
_tGLOSSARY --
_tINDEX.
520 0 _aA generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of.
530 _a2
_ub
650 0 _aComputer security
_zUnited States.
650 0 _aComputer networks
_xSecurity measures
_zUnited States.
650 0 _aCyberspace
_xSecurity measures
_zUnited States.
650 0 _aCyberterrorism
_zUnited States
_xPrevention.
650 0 _aInformation warfare
_zUnited States
_xPrevention.
650 0 _aCyberspace operations (Military science)
655 1 _aElectronic Books.
700 1 _aFriedman, Allan.
856 4 0 _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=657629&site=eds-live&custid=s3260518
_zClick to access digital title | log in using your CIU ID number and my.ciu.edu password
942 _cOB
_D
_eEB
_hQA..
_m2014
_QOL
_R
_x
_8NFIC
_2LOC
994 _a92
_bNT
999 _c100404
_d100404
902 _a1
_bCynthia Snell
_c1
_dCynthia Snell