Adopting a multidisciplinary perspective, this book explores the key challenges associated with the proliferation of cyber capabilities. Over the past two decades, a new man-made domain of conflict has materialized. Alongside armed conflict in the domains of land, sea, air, and space, hostilities between different types of political actors are now taking place in cyberspace. This volume addresses the challenges posed by cyberspace hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions : do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed ?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims ?; and, how does the advent of conflict in cyberspace challenge our established legal framework ? By asking important strategic questions on the theoretical, strategic, ethical and legal implications and challenges of the proliferation of cyber warfare capabilities, the book seeks to stimulate research into an area that has hitherto been neglected.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of 'information war', covering its development over the last two decades and seeks to answer the following questions : is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits ?
David Clark, Thomas Berson, and Herbert S. Lin, Editors; Committee on Developing a Cybersecurity Primer: Leveraging Two Decades of National Academies Work; Computer Science and Telecommunications Board (CSTB); Division on Engineering and Physical Sciences (DEPS); National Research Council (2014)
INFO: The authors decided unanimously to make their work freely accessible. This decision is backed by NATO.
Publishing of the material and requiring any form of authentication, identification or other conditions to be fulfilled before providing the original files is not permitted.
Includes the following articles:
-A Non-Militarised Approach to Cyber-Security (P. 1 - 9)
-An Exceptional war That Ended in Victory for Estonia or an Ordinary e-Disturbance? Estonian Narratives of the Cyber-Attacks in 2007 (P. 18-25)
-Recent Cyberwar Spectrum and its Analysis (P. 45-53)
-Metrics Framework of Cyber Operations on Command and Control (P. 53-63)
-Governance of CyberSecurity in South Africa (P. 135-145)
-Explaining Politico-Strategic Cyber Security: The Feasibility of Applying Arms Race Theory (P. 151-163)
-Simulation Approach for Military Cyber Operations (P. 180-188)
-A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict (P. 198-206)
-Building an Ontology for Cyberterrorism (P. 286-296)
-Cyber Threat at Management in Cognitive Networks (P. 320-329)