Cybersecurity and cyberwar : what everyone needs to know / P.W. Singer and Allan Friedman.

A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via ProQuest)
Main Author: Singer, P. W. (Peter Warren) (Author)
Other Authors: Friedman, Allan
Format: eBook
Language:English
Published: Oxford : Oxford University Press, [2014]
Series:What everyone needs to know.
Subjects:
Table of Contents:
  • INTRODUCTION. Why write a book about cybersecurity and cyberwar?
  • Why is there a cybersecurity knowledge gap, and why does it matter?
  • How did you write the book and what do you hope to accomplish?
  • PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace
  • Where did this "cyber stuff" come from anyway? A short history of the internet
  • How does the internet actually work?
  • Who runs it? Understanding internet governance
  • On the internet, how do they know whether you are a dog? Identity and authentication
  • What do we mean by "security" anyway?
  • What are the threats?
  • One phish, two phish, red phish, cyber phish: what are vulnerabilities?
  • How do we trust in cyberspace?
  • Focus: What happened in WikiLeaks?
  • What is an advanced persistent threat (APT)?
  • How do we keep the bad guys out? The basics of computer defense
  • Who is the weakest link? Human factors
  • PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks
  • Whodunit? The problem of attribution
  • What Is hactivism?
  • Focus: Who is Anonymous?
  • The crimes of tomorrow, today: what is cybercrime?
  • Shady RATs and cyberspies: what is cyber espionage?
  • How afraid should we be of cyberterrorism?
  • So how do terrorists actually use the web?
  • What about cyber counterterrorism?
  • Security risk or human right? Foreign policy and the internet
  • Focus: What is Tor and why does peeling back the onion matter?
  • Who are patriotic hackers?
  • Focus: What was Stuxnet?
  • What is the hidden lesson of Stuxnet? The ethics of cyberweapons
  • "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar
  • A war by any other name? The legal side of cyber conflict
  • What might a "cyberwar" actually look like? Computer network operations
  • Focus: What is the US military approach to cyberwar?
  • Focus: What is the Chinese approach to cyberwar?
  • What about deterrence in an era of cyberwar?
  • Why is threat assessment so hard in cyberspace?
  • Does the cybersecurity world favor the weak or the strong?
  • Who has the advantage, the offense or the defense?
  • A new kind of arms race: what are the dangers of cyber proliferation?
  • Are there lessons from past arms races?
  • Behind the scenes: is there a cyber-industrial complex?
  • PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet?
  • Rethink security: what is resilience, and why is it important?
  • Reframe the problem (and the solution): what can we learn from public health?
  • Learn from history: what can (real) pirates teach us about cybersecurity?
  • Protect world wide governance for the world wide web: what Is the role of international institutions?
  • "Graft" the rule of law: do we need a cyberspace treaty?
  • Understand the limits of the state in cyberspace: why can't the government handle it?
  • Rethink government's role: how can we better organize for cybersecurity?
  • Approach it as a public-private problem: how do we better coordinate defense?
  • Exercise is good for you: how can we better prepare for cyber incidents?
  • Build cybersecurity incentives: why should I do what you want?
  • Learn to share: how can we better collaborate on information?
  • Demand disclosure: what is the role of transparency?
  • Get "vigorous" about responsibility: how can we create accountability for security?
  • Find the IT crowd: how do we solve the cyber people problem?
  • Do your part: how can I protect myself (and the internet)?
  • CONCLUSIONS. Where is cybersecurity headed next?
  • What do I really need to know in the end?
  • Acknowledgments
  • Notes
  • Glossary
  • Index.