Buch, Englisch, 360 Seiten, Format (B × H): 160 mm x 234 mm, Gewicht: 658 g
The Challenge to National Security
Buch, Englisch, 360 Seiten, Format (B × H): 160 mm x 234 mm, Gewicht: 658 g
ISBN: 978-1-4665-9201-8
Verlag: CRC Press
The discussion begins with thoughtful contributions concerning the attributes and importance of cyberspace to the American way of life and global prosperity. Examining the truths and myths behind recent headline-grabbing malicious cyber activity, the book spells out the challenges involved with establishing a robust system of monitoring, controls, and sanctions to ensure cooperation amongst all stakeholders. The desire is to create a domain that functions as a trusted and resilient environment that fosters cooperation, collaboration, and commerce. Additionally, the book:
- Delves into the intricacies and considerations cyber strategists must contemplate before engaging in cyber war
- Offers a framework for determining the best ways to engage other nations in promoting global norms of behavior
- Illustrates technologies that can enable cyber arms control agreements
- Dispels myths surrounding Stuxnet and industrial control systems
General Michael V. Hayden, former director of the National Security Agency and the Central Intelligence Agency, begins by explaining why the policymakers, particularly those working on cyber issues, must come to understand the policy implications of a dynamic domain. Expert contributors from the Air Force Research Institute, MIT, the Rand Corporation, Naval Postgraduate School, NSA, USAF, USMC, and others examine the challenges involved with ensuring improved cyber security.
Outlining the larger ethical, legal, and policy challenges facing government, the private sector, civil society, and individual users, the book offers plausible solutions on how to create an environment where there is confidence in the ability to assure national security, conduct military operations, and ensure a vibrant and stable global economy.
Zielgruppe
Anyone interested in the field of cyber warfare/cyber operationsor looking to expand a cyber security career, including cyber commanders, information operations officers, information security/assurance professionals, cyber security consultants, cyber strategists, military members (J2, J3, J6, J9 types), SOC/NOC security analysts, network security engineers, penetration testers, auditors, government officials, and security engineers.
Autoren/Hrsg.
Fachgebiete
- Sozialwissenschaften Politikwissenschaft Militärwesen Nationale und Internationale Sicherheits- und Verteidigungspolitik
- Wirtschaftswissenschaften Wirtschaftssektoren & Branchen Dienstleistungssektor & Branchen Sicherheitsgewerbe
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Introduction. KEY CONSIDERATIONS. The Future of Things Cyber. What’s Wrong with Cyberspace? Cyberspace Security Considerations.Two, Maybe Three Cheers for Ambiguity. The Essential Features of an Ontology for Cyber Warfare. Cyber Defense as Environmental Protection: The Broader Potential Impact of Failed Defensive Counter Cyber Operations. TECHNOLOGY. Challenges in Monitoring Cyber Arms Compliance. Digital Policy Management: A Foundation for Tomorrow; National Security Agency Enterprise Service Division-Identity and Access Branch On Mission Assurance. Stuxnet: A Case Study in Cyber Warfare. Digital Dissent: The Internet and Dissent in Authoritarian States. ETHICS, LAW, AND POLICE. Can There be an Ethical Cyber War? Perspectives for Cyber Strategists on Cyber Law for Cyber War. A New Normal? The Cultivation of Global Norms as Part of a Cyber Security Strategy. The Prospects for Cyber Deterrence: American Sponsorship of Global Norms for Cyberspace. Cyber Sovereignty. American Cybersecurity Triad: Government-wide Integration, Technological Counterintelligence, and Educational Mobilization.