In this Book

summary

In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes.

Cyberspace and National Security brings together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there. Policymakers and strategists will find this book to be an invaluable resource in their efforts to ensure national security and answer concerns about future cyberwarfare.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Contents
  2. restricted access
    • Download PDF Download
  1. List of Illustrations
  2. p. vii
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. p. ix
  3. restricted access
    • Download PDF Download
  1. PART I: THINKING ABOUT CYBER
  1. 1. An Introduction to National Security and Cyberspace
  2. pp. 3-19
  3. restricted access
    • Download PDF Download
  1. 2. Speculative Security
  2. pp. 21-35
  3. restricted access
    • Download PDF Download
  1. 3. Operational Considerations in Cyber Attack and Cyber Exploitation
  2. pp. 37-56
  3. restricted access
    • Download PDF Download
  1. 4. Joining Cybercrime and Cyberterrorism: A Likely Scenario
  2. pp. 57-68
  3. restricted access
    • Download PDF Download
  1. PART II: ARMED CONFLICT AND CYBER DEFENSE
  1. 5. Inter arma silent leges Redux? The Law of Armed Conflict and Cyber Conflict
  2. pp. 71-87
  3. restricted access
    • Download PDF Download
  1. 6. The Emerging Structure of Strategic Cyber Offense, Cyber Defense, and Cyber Deterrence
  2. pp. 89-104
  3. restricted access
    • Download PDF Download
  1. 7. A New Framework for Cyber Deterrence
  2. pp. 105-120
  3. restricted access
    • Download PDF Download
  1. 8. Cybered Conflict, Cyber Power, and Security Resilience as Strategy
  2. pp. 121-136
  3. restricted access
    • Download PDF Download
  1. PART III: NATIONAL APPROACHES TO CYBERSECURITY AND CYBERWAR
  1. 9. Persistent Enemies and Cyberwar: Rivalry Relations in an Age of Information Warfare
  2. pp. 139-157
  3. restricted access
    • Download PDF Download
  1. 10. Competing Transatlantic Visions of Cybersecurity
  2. pp. 159-172
  3. restricted access
    • Download PDF Download
  1. 11. The Bear Goes Digital: Russia and Its Cyber Capabilities
  2. pp. 173-189
  3. restricted access
    • Download PDF Download
  1. 12. China in Cyberspace
  2. pp. 191-205
  3. restricted access
    • Download PDF Download
  1. 13. Toward a Theory of Cyber Power: Strategic Purpose in Peace and War
  2. pp. 207-224
  3. restricted access
    • Download PDF Download
  1. 14. Conclusion
  2. pp. 225-230
  3. restricted access
    • Download PDF Download
  1. Contributors
  2. pp. 231-235
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 237-246
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.