In this Book

summary
The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas. The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization. Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges. With more than two dozen contributors, Cyberpower and National Security covers it all.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page, Copyright
  2. pp. i-iv
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-viii
  3. restricted access
    • Download PDF Download
  1. List of Illustrations
  2. pp. ix-xii
  3. restricted access
    • Download PDF Download
  1. Preface
  2. pp. xiii-xiv
  3. restricted access
    • Download PDF Download
  1. Introduction
  2. pp. xv-xxii
  3. restricted access
    • Download PDF Download
  1. Part I. Foundation and Overview
  1. 1. Cyberpower and National Security: Policy Recommendations for a Strategic Framework
  2. Franklin D. Kramer
  3. pp. 1-23
  4. restricted access
    • Download PDF Download
  1. 2. From Cyberspace to Cyberpower: Defining the Problem
  2. Daniel T. Kuehl
  3. pp. 24-42
  4. restricted access
    • Download PDF Download
  1. 3. Toward a Preliminary Theory of Cyberpower
  2. Stuart H. Starr
  3. pp. 43-88
  4. restricted access
    • Download PDF Download
  1. Part II. Cyberspace
  1. 4. A Graphical Introduction to the Structural Elements of Cyberspace
  2. Elihu Zimet, Edward Skoudis
  3. pp. 91-112
  4. restricted access
    • Download PDF Download
  1. 5. Cyberspace and Infrastructure
  2. William D. O'Neil
  3. pp. 113-146
  4. restricted access
    • Download PDF Download
  1. 6. Evolutionary Trends in Cyberspace
  2. Edward Skoudis
  3. pp. 147-170
  4. restricted access
    • Download PDF Download
  1. 7. Information Security Issues in Cyberspace
  2. Edward Skoudis
  3. pp. 171-205
  4. restricted access
    • Download PDF Download
  1. 8. The Future of the Internet and Cyberpower
  2. Marjory S. Blumenthal, David D. Clark
  3. pp. 206-240
  4. restricted access
    • Download PDF Download
  1. 9. Information Technology and the Biotech Revolution
  2. Edward Skoudis
  3. pp. 241-250
  4. restricted access
    • Download PDF Download
  1. Part III. Cyberpower: Military Use and Deterrence
  1. 10. An Environmental Approach to Understanding Cyberpower
  2. Gregory J. Rattray
  3. pp. 253-274
  4. restricted access
    • Download PDF Download
  1. 11. Military Cyberpower
  2. Martin C. Libicki
  3. pp. 275-284
  4. restricted access
    • Download PDF Download
  1. 12. Military Service Overview
  2. Elihu Zimet, Charles L. Barry
  3. pp. 285-308
  4. restricted access
    • Download PDF Download
  1. 13. Deterrence of Cyber Attacks
  2. Richard L. Kugler
  3. pp. 309-340
  4. restricted access
    • Download PDF Download
  1. Part IV. Cyberpower: Information
  1. 14. Cyber Influence and International Security
  2. Franklin D. Kramer, Larry K. Wentz
  3. pp. 343-361
  4. restricted access
    • Download PDF Download
  1. 15. Tactical Influence Operations
  2. Stuart H. Starr
  3. pp. 362-372
  4. restricted access
    • Download PDF Download
  1. 16. I-Power: The Information Revolution and Stability Operations
  2. Franklin D. Kramer, Larry K. Wentz, Stuart H. Starr
  3. pp. 373-391
  4. restricted access
    • Download PDF Download
  1. 17. Facilitating Stability Operations with Cyberpower
  2. Gerard J. Christman
  3. pp. 392-412
  4. restricted access
    • Download PDF Download
  1. Part V. Cyberpower: Strategic Problems
  1. 18. Cyber Crime
  2. Clay Wilson
  3. pp. 415-436
  4. restricted access
    • Download PDF Download
  1. 19. Cyber Terrorism: Menace or Myth?
  2. Irving Lachow
  3. pp. 437-464
  4. restricted access
    • Download PDF Download
  1. 20. Nation-state Cyber Strategies: Examples from China and Russia
  2. Timothy L. Thomas
  3. pp. 465-488
  4. restricted access
    • Download PDF Download
  1. Part VI. Institutional Factors
  1. 21. Internet Governance
  2. Harold Kwalwasser
  3. pp. 491-524
  4. restricted access
    • Download PDF Download
  1. 22. International Law and Information Operations
  2. Thomas C. Wingfield
  3. pp. 525-542
  4. restricted access
    • Download PDF Download
  1. 23. Cyberpower and Critical Infrastructure Protection: A Critical Assessment of Federal Efforts
  2. John A. McCarthy, Chris Burrow, Maeve Dion, Olivia Pacheco
  3. pp. 543-556
  4. restricted access
    • Download PDF Download
  1. 24. Cyberpower from the Presidential Perspective
  2. Leon Fuerth
  3. pp. 557-562
  4. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 563-622
  3. restricted access
    • Download PDF Download
  1. About the Contributors
  2. pp. 623-626
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 627-642
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.