Cyberpower and National Security: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 13: Line 13:
* Overview: [[Books]]
* Overview: [[Books]]


* Threats and Actors: [[Electricity, Oil and Natural Gas]]; [[Public Data Networks]];  
* Threats and Actors: [[Electricity, Oil and Natural Gas]]; [[Public Data Networks]]; [[The Threat and Skeptics]]


* Issues: [[Attribution]]; [[Public-Private Cooperation]];  
* Issues: [[Attribution]]; [[Cybercrime]]; [[Public-Private Cooperation]];  


* Approaches: [[Government Organization]]; [[International Cooperation]]; [[Regulation/Liability]]
* Approaches: [[Government Organization]]; [[International Cooperation]]; [[Regulation/Liability]]
* Threats and Actors:  [[Communications]]; [[Electricity, Oil and Natural Gas]]; [[Financial Institutions and Networks]]; [[Government Networks (.gov)]]; [[Military Networks (.mil)]]; [[Private Critical Infrastructure]]; [[Public Critical Infrastructure]]; [[States]]; [[Terrorists]]; [[Transportation]]; [[Water, Sewer, etc.]]
* Issues: [[Information Sharing/Disclosure]]; [[Public-Private Cooperation]];


==Key Words==     
==Key Words==     
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#COTS_Software | COTS Software]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#COTS_Software | COTS Software]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Terrorism | Cyber Terrorism]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Warfare | Cyber Warfare]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Warfare | Cyber Warfare]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Digital_Pearl_Harbor | Digital [Cyber] Pearl Harbor]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Digital_Pearl_Harbor | Digital [Cyber] Pearl Harbor]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Department_of_Homeland_Security | Department of Homeland Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Department_of_Homeland_Security | Department of Homeland Security]],
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacktivism | Hacktivism]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Laws_of_War | Laws of War]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Cybersecurity_Strategy_(U.S.) | National Cybersecurity Strategy (U.S.)]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Organized_Crime | Organized Crime]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SCADA_Systems | SCADA Systems]]


==Synopsis==
==Synopsis==

Revision as of 10:24, 9 July 2010

Full Title of Reference

Cyberpower and National Security

Full Citation

Cyberpower and National Security (Franklin D. Kramer, Stuart H. Starr & Larry Wentz eds., 2009). Purchase

BibTeX

Categorization

Key Words

Botnet, COTS Software, Computer Network Attack, Cyber Crime, Cyber Terrorism, Cyber Warfare, Digital [Cyber] Pearl Harbor, Department of Homeland Security, Hacktivism, Laws of War, National Cybersecurity Strategy (U.S.), Organized Crime, SCADA Systems

Synopsis

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas. The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization. Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges.

Additional Notes and Highlights

Expertise required: None

Table of Contents (PDF)

Introduction (PDF)

This book is sponsored by The National Defense University.