Cybersecurity and Cyberwar

ISBN-10: 0199918112
ISBN-13: 9780199918119
Edition: 2013
List price: $18.95 Buy it from $14.60
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's  More...

New Starting from $14.84
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Business Ethics Online content $4.95 $1.99
Add to cart
Study Briefs
Business Law Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $18.95
Copyright year: 2013
Publisher: Oxford University Press
Publication date: 1/17/2014
Binding: Paperback
Pages: 224
Size: 5.50" wide x 8.25" long x 0.75" tall
Weight: 0.946
Language: English

Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The Americanmilitary, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recentStuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers - presumably sponsored by the Chinese government - is another. Together, they point to a new era in the evolution ofhuman conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploitedand why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educatedlayman who wants to know more about the nature of war, conflict, and security in the twenty first century.

Peter Warren Singer graduated with a BA from Princeton University's Woodrow Wilson School of Public and International Affairs and earned his Ph.D. in Government at Harvard University. Previous career experiences include working for the Belfer Center for Science and International Affairs at Harvard University, the Balkans Task Force in the U.S. Department of Defense, and the International Peace Academy. He also served as the Defense Policy Task Force coordinator for Barack Obama's 2008 presidential campaign. Singer is the Director of the 21st Century Defense Initiative at the Brookings Institution and was the youngest scholar named a Senior Fellow by the Institution. He has written the following books about contemporary warfare: Corporate Warriors, Children at War, and Wired for War. Corporate Warriors, about private companies providing services to the military, was named best book of the year by the American Political Science Association. Children at War, which examines the role of child soldiers, was recognized as the 2006 Robert F. Kennedy Memorial Book of the Year Award. Wired for War became a New York Times bestseller in the first week of its release and focuses on current technologies being used in warfare, including robotics. Singer is a frequent consultant and commentator and has written numerous articles for major publications including the Washington Post, Foreign Affairs, and World Policy Journal, as well as spoken on the radio and appeared on television.

Why cyberspace is wonderful
EL and complicated
What is cyberspace?
Why do people talk about the difference of a networked world?
How does the Internet actually work?
Who owns this thing?
Wait! You mean no one runs the internet?
What can governments do online? What are the limits of state power?
Just how dependent are we on cyberspace?
Security and Insecurity Online
What do we mean by a "secure" system?
What is the difference between an attack on a network and an attack on a system?
How does anti-virus software work?
How do you defend a network?
Why is anonymity a problem online? Why is it relatively easy to act without accountability?
How can you authenticate some one to be sure they are who they say they are?
How do we keep data secure in cyberspace?
Threats and Bad Actors
Differentiating threats
Value at risk
What are the bad guys after? What can you really do with a computer?
What's the worst you can do? Can a hacker really turn off the power grid?
Different motivations of attackers
Different types of attacks
What is Cyber Terrorism, actually?
What does "cyberwarfare" mean?
How are countries militarizing cyberspace? Why?
So if we just built better systems, could we have a secure internet?
Case Studies / Examples of attacks
Aurora / Google (phishing, attribution)
Stuxnet (Critical infrastructure, intelligence)
Wikileaks data breach and fallout (data protection, Do
S)Israel-Syria Air Defense (Cyber-Kinetic Crossover, cyberwar)
Why securing cyberspace is hard
What are some mechanisms that enable us to trust systems or data?
What is the difference between espionage and exploitation?
Why not just write better software?
Why can't network operators detect bad behavior?
Why security through obscurity doesn't work
How do we know what has happened after a cyber incident?
How does the rise in "cloud computing" change the dynamics of cyber security?
What makes mobile computing different?
If everyone's systems are vulnerable, can't defenders just interrupt the attacker's systems?
Why is it so hard to know who the attackers are?
Why does attribution matter?
How do we measure a cyber risk?
Why aren't users able to protect themselves?
Don't vendors and service providers have enough incentives to provide good security?
Why aren't companies investing enough to protect themselves?
International Dimensions
What changes when cyber problems cross international borders?
How do countries differ in their approach to cyberspace?
Who has the biggest cyber armies?
What constitutes an act of war?
How does law enforcement deal with international boundaries?
What are existing international organizations currently doing?
Why don't the classic models of military deterrence work for cyberspace?
What are the obstacles to international cooperation to resolve cybersecurity issues?
The path forward to a more secure cyberspace
It sounds like every aspect of modern life is vulnerable. Are things really that bad?
Why can't we just re-built the technology to prevent bad behavior?
Can we impose accountability through national control of cyberspace?
How can private firms be incentivized to internalize their risk?
If a company or government agency was willing to invest in cyber security defenses, what would stand in their way?
Can internet service providers do more to identity and stop bad behavior?
How can we make it harder for bad actors to profit from successful attacks
What can I do to protect myself?

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×