Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman.
A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the...
Saved in:
Online Access: |
Full Text (via ProQuest) |
---|---|
Main Author: | |
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Oxford :
Oxford University Press,
[2014]
|
Series: | What everyone needs to know.
|
Subjects: |
Table of Contents:
- INTRODUCTION. Why write a book about cybersecurity and cyberwar?
- Why is there a cybersecurity knowledge gap, and why does it matter?
- How did you write the book and what do you hope to accomplish?
- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace
- Where did this "cyber stuff" come from anyway? A short history of the internet
- How does the internet actually work?
- Who runs it? Understanding internet governance
- On the internet, how do they know whether you are a dog? Identity and authentication
- What do we mean by "security" anyway?
- What are the threats?
- One phish, two phish, red phish, cyber phish: what are vulnerabilities?
- How do we trust in cyberspace?
- Focus: What happened in WikiLeaks?
- What is an advanced persistent threat (APT)?
- How do we keep the bad guys out? The basics of computer defense
- Who is the weakest link? Human factors
- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks
- Whodunit? The problem of attribution
- What Is hactivism?
- Focus: Who is Anonymous?
- The crimes of tomorrow, today: what is cybercrime?
- Shady RATs and cyberspies: what is cyber espionage?
- How afraid should we be of cyberterrorism?
- So how do terrorists actually use the web?
- What about cyber counterterrorism?
- Security risk or human right? Foreign policy and the internet
- Focus: What is Tor and why does peeling back the onion matter?
- Who are patriotic hackers?
- Focus: What was Stuxnet?
- What is the hidden lesson of Stuxnet? The ethics of cyberweapons
- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar
- A war by any other name? The legal side of cyber conflict
- What might a "cyberwar" actually look like? Computer network operations
- Focus: What is the US military approach to cyberwar?
- Focus: What is the Chinese approach to cyberwar?
- What about deterrence in an era of cyberwar?
- Why is threat assessment so hard in cyberspace?
- Does the cybersecurity world favor the weak or the strong?
- Who has the advantage, the offense or the defense?
- A new kind of arms race: what are the dangers of cyber proliferation?
- Are there lessons from past arms races?
- Behind the scenes: is there a cyber-industrial complex?
- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet?
- Rethink security: what is resilience, and why is it important?
- Reframe the problem (and the solution): what can we learn from public health?
- Learn from history: what can (real) pirates teach us about cybersecurity?
- Protect world wide governance for the world wide web: what Is the role of international institutions?
- "Graft" the rule of law: do we need a cyberspace treaty?
- Understand the limits of the state in cyberspace: why can't the government handle it?
- Rethink government's role: how can we better organize for cybersecurity?
- Approach it as a public-private problem: how do we better coordinate defense?
- Exercise is good for you: how can we better prepare for cyber incidents?
- Build cybersecurity incentives: why should I do what you want?
- Learn to share: how can we better collaborate on information?
- Demand disclosure: what is the role of transparency?
- Get "vigorous" about responsibility: how can we create accountability for security?
- Find the IT crowd: how do we solve the cyber people problem?
- Do your part: how can I protect myself (and the internet)?
- CONCLUSIONS. Where is cybersecurity headed next?
- What do I really need to know in the end?
- Acknowledgments
- Notes
- Glossary
- Index.