Understanding Cyber-Warfare : Politics, Policy and Strategy.
| Author/creator | Whyte, Christopher, 1988- |
| Other author | Mazanec, Brian M. |
| Format | Electronic |
| Publication Info | Milton : Routledge, 2018. |
| Description | 1 online resource (307 pages) |
| Supplemental Content | ProQuest Ebook Central |
| Subjects |
| Contents | Cover; Half Title; Praise; Title Page; Copyright Page; Table of Contents; List of illustrations; Boxes; Figures; Tables; Acknowledgements; List of abbreviations; Chapter 1: Introduction; Aims of the book; What is cyber-security?; What is the scope of cyber warfare and conflict?; Themes of the book; Plan of the book; Notes; Further reading; Chapter 2: The technological foundations of insecurity in the digital age; The technological foundations of cyber insecurity; What's vulnerable in the information age?; Beyond design: network externalities as an underlying source of insecurity |
| Contents | From bytes to fights notes; Further reading; Chapter 3: Cyberspace and international relations; The rise of a global cyber ecosystem; Why cyberspace matters for IR theory; Realism, liberalism, constructivism: IR's paradigms and cyber conflict; Where to next?; Notes; Further reading; Chapter 4: Exploitation: from signals intelligence to cyber warriors; The unbreakable marriage of computers and espionage; Enter Enigma; The Tunny and the Colossus; Cold War computing and the move from narrow to general; Enter the Internet; Stunted development, crypto protection, and delayed realization |
| Contents | Maturation and exploitation in the age of cyber conflict; Towards cyber warfighting; Notes; Further reading; Chapter 5: Attack: from exploitation to offensive cyber operations; OCOs and the digital domain today; Offensive cyber operations as a revolution in military affairs; The special characteristics of cyber "weapons"; What do offensive cyber operations actually look like?; Understanding cyber warfare; Notes; Further reading; Chapter 6: A brief history of major cyber conflict episodes; Formative episodes in the history of interstate cyber conflict; Next steps; Notes; Further reading |
| Contents | Chapter 7: States at cyberwar: the dynamics of interstate cyber interactions; What is vulnerable in the age of cyber conflict?; Cyberwar: how likely is it to take place?; Does cyberspace make states more likely to attack one another?; Can states use cyber weapons for coercion?; Can states deter cyber aggression?; Cyber power and power in the digital age; Implications for policy and statecraft; Notes; Further reading; Chapter 8: Cyber conflict as "not war"; Between war and peace; Information warfare; The utility of cyber conflict for "not war"; Making sense of cyber conflict in the "grey zone." |
| Contents | Future trends; Notes; Further reading; Chapter 9: Non-state actors: terrorism, subversion, and activism online; Non-state actors and cyber security: some terminology; Social activism in the digital age; Hactivism; Terrorism and information technologies; Subversion; Criminal and political hacking; Making sense of the global cyber ecosystem; Notes; Further reading; Chapter 10: National experiences with cyber-security: realization and institutional development; The shape of cyber-security policymaking; Realization, fragmentation, and militarization; U.S. cyber experience |
| Summary | This textbook offers an accessible introduction to the historical, technical, and strategic context of cyber conflict.--The international relations, policy, doctrine, strategy, and operational issues associated with computer network attack, computer network exploitation, and computer network defense are collectively referred to as cyber warfare. This new textbook provides students with a comprehensive perspective on the technical, strategic, and policy issues associated with cyber conflict as well as an introduction to key state and non-state actors. --Specifically, the book provides a comprehensive overview of these key issue areas: -- --the historical emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation, and defense; -- a theoretical set of perspectives on conflict in the digital age from the point of view of international relations (IR) and the security studies field; -- the current national perspectives, policies, doctrines, and strategies relevant to cyber warfare; and -- an examination of key challenges in international law, norm development, and the potential impact of cyber warfare on future international conflicts.--This book will be of much interest to students of cyber conflict and other forms of digital warfare, security studies, strategic studies, defense policy, and, most broadly, international relations. |
| General note | Europe, NATO, and cyber-security |
| Source of description | Print version record. |
| Issued in other form | Print version: Whyte, Christopher. Understanding Cyber-Warfare : Politics, Policy and Strategy. Milton : Routledge, ©2018 9781138640603 |
| Genre/form | Electronic books. |
| Genre/form | Electronic books. |
| ISBN | 9781317265221 |
| ISBN | 131726522X |
Availability
| Library | Location | Call Number | Status | Item Actions |
|---|---|---|---|---|
| Electronic Resources | Access Content Online | ✔ Available |