Cyberpower and National Security: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
(New page: ==Full Title of Reference== Cyberpower and National Security ==Full Citation== Cyberpower and National Security (Franklin D. Kramer, Stuart H. Starr & Larry Wentz, eds. 1998). [http://...)
 
 
(46 intermediate revisions by the same user not shown)
Line 5: Line 5:
==Full Citation==
==Full Citation==


Cyberpower and National Security (Franklin D. Kramer, Stuart H. Starr & Larry Wentz, eds. 1998).  [http://www.amazon.com/Cyberpower-National-Security-Defense-University/dp/1597974234  ''Purchase'']
Cyberpower and National Security (Franklin D. Kramer, Stuart H. Starr & Larry Wentz eds., 2009).   


[URL.to.Bibliography_Detailed_Entry ''BibTeX'']
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=Kramer_et_al:2009 ''BibTeX'']
[http://books.google.com/books?id=Q6cpAQAAIAAJ&q=Cyberpower+and+National+Security&dq=Cyberpower+and+National+Security&ei=d9xRTOLFF6LWzATtgs2sDQ&cd=1  ''Google Books'']
[http://www.worldcat.org/search?q=isbn:9781597974233 ''World Cat'']
[http://www.amazon.com/Cyberpower-National-Security-Defense-University/dp/1597974234  ''Amazon'']


==Categorization==
==Categorization==
 
* Resource by Type: [[Books]]
* Issues: [[Cyberwar]]; [[Incentives]] <- put categories in alphabetical order separated by semicolons
* Threats and Actors: [[Electricity, Oil and Natural Gas]]; [[Public Data Networks]]; [[The Threat and Skeptics]]
 
* Issues: [[Attribution]]; [[Cybercrime]]; [[Public-Private Cooperation]];
* Approaches: [[Deterrence]]
* Approaches: [[Government Organization]]; [[International Cooperation]]; [[Regulation/Liability]]


==Key Words==     
==Key Words==     
 
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Casus_Belli | Casus Belli]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Computer_Network_Attack | Computer Network Attack]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#COTS_Software | COTS Software]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#COTS_Software | COTS Software]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Terrorism | Cyber Terrorism]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Warfare | Cyber Warfare]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Warfare | Cyber Warfare]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Department_of_Homeland_Security | Department of Homeland Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Department_of_Homeland_Security | Department of Homeland Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#DDoS_Attack | Denial of Service Attacks]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Digital_Pearl_Harbor | Digital [Cyber] Pearl Harbor]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hackers]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacktivism | Hacktivism]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Intelligence_Infrastructure.2FInformation_Infrastructure | Intelligence Community]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Laws_of_War | Laws of War]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malicious Code (Malware)]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Cybersecurity_Strategy_(U.S.) | National Cybersecurity Strategy (U.S.)]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Security | National Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Organized_Crime | Organized Crime]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Risk_Modeling | Risk Modeling]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SCADA_Systems | SCADA Systems]]
[[Keyword_Index_and_Glossary_of_Core_Ideas#Sponsored_Attacks | Sponsored Attacks]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#State_Affiliation | State Affiliation]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]]
 
<- put keywords in alphabetical order separated by colons and makes sure the glossary entry has a link back to this wiki.  The links in the Keyword Index and Glossary page that link back here should jump to the top of this wiki page and not somewhere within. While it is convenient in glossary mode to click on a key word - go to the definition - then jump back, in keyword index mode the user will be jumping to a new reference s/he has not seen before and it would be confusing to jump so that all the user saw was the key words or synopsis but not the title.  So please do this:
 
References:
* [[TemplateForSources | Moore and Clayton]]
 
not this:
 
References:
* [[TemplateForSources#Key_Words | Moore and Clayton]]
 
or this:
 
References:
* [[TemplateForSources#Synopsis | Moore and Clayton]]
 
in the Keyword Index and Glossary.


==Synopsis==
==Synopsis==
Line 73: Line 58:
==Additional Notes and Highlights==
==Additional Notes and Highlights==


'' * Outline key points of interest or other information that does not fit in one of the topics above
Expertise required: None
 
 
===[http://www.potomacbooksinc.com/resrcs/tocs/1597974234_TOC.pdf Table of Contents]===
 
[http://www.potomacbooksinc.com/resrcs/frontm/1597974234_intro.pdf Introduction]
<ul style="list-style-type:none">
  <li> Part I. Foundation and Overview
    <ol>
      <li>Cyberpower and National Security: Policy Recommendations for a Strategic Framework<br />  ''Franklin D. Kramer''</li>
      <li>From Cyberspace to Cyberpower: Defining the Problem<br />  ''Daniel T. Kuehl''</li>
      <li>Toward a Preliminary Theory of Cyberpower<br />  ''Stuart H. Starr''</li>
    </ol></li>
  <li>Part II. Cyberspace
    <ol start="4">
      <li>A Graphical Introduction to the Structural Elements of Cyberspace<br />  ''Elihu Zimet and Edward Skoudis''</li>
      <li>Cyberspace and Infrastructure<br />  ''William D. O’Neil''</li>
      <li>Evolutionary Trends in Cyberspace<br />  ''Edward Skoudis''</li>
      <li>Information Security Issues in Cyberspace<br />  ''Edward Skoudis''</li>
      <li>The Future of the Internet and Cyberpower<br />  ''Marjory S. Blumenthal and David D. Clark''</li>
      <li>Information Technology and the Biotech Revolution<br />  ''Edward Skoudis''</li>
    </ol></li>
  <li>Part III. Cyberpower: Military Use and Deterrence
    <ol start="10">
      <li>An Environmental Approach to Understanding Cyberpower<br />  ''Gregory J. Rattray''</li>
      <li>Military Cyberpower<br />  ''Martin C. Libicki''</li>
      <li>Military Service Overview<br />  ''Elihu Zimet and Charles L. Barry''</li>
      <li>Deterrence of Cyber Attacks<br />  ''Richard L. Kugler''</li>
    </ol></li>
  <li>Part IV. Cyberpower: Information
    <ol start="14">
      <li>Cyber Influence and International Security<br />  ''Franklin D. Kramer and Larry K. Wentz''</li>
      <li>Tactical Influence Operations<br />  ''Stuart H. Starr''</li>
      <li>I-Power: The Information Revolution and Stability Operations<br />  ''Franklin D. Kramer, Larry K. Wentz, and Stuart H. Starr''</li>
      <li>Facilitating Stability Operations with Cyberpower<br />  ''Gerard J. Christman''</li>
    </ol></li>
  <li>Part V. Cyberpower: Strategic Problems
    <ol start="18">
      <li>Cyber Crime<br />  ''Clay Wilson''</li>
      <li>Cyber Terrorism: Menace or Myth?<br />  ''Irving Lachow''</li>
      <li>Nation-state Cyber Strategies: Examples from China and Russia<br />  ''Timothy L. Thomas''</li>
    </ol></li>
  <li>Part VI. Institutional Factors
    <ol start="21">
      <li>Internet Governance<br />  ''Harold Kwalwasser''</li>
      <li>International Law and Information Operations<br />  ''Thomas C. Wingfield''</li>
      <li>[http://cip.gmu.edu/archive/2009_Cyberpower_CIP.pdf Cyberpower and Critical Infrastructure Protection: A Critical Assessment of Federal Efforts]<br />  ''John A. McCarthy with Chris Burrow, Maeve Dion, and Olivia Pacheco''</li>
      <li>Cyberpower from the Presidential Perspective<br />  ''Leon Fuerth''</li>
    </ol></li>
</ul>
This book is sponsored by [http://www.ndu.edu/ The National Defense University].

Latest revision as of 15:55, 29 July 2010

Full Title of Reference

Cyberpower and National Security

Full Citation

Cyberpower and National Security (Franklin D. Kramer, Stuart H. Starr & Larry Wentz eds., 2009).

BibTeX Google Books World Cat Amazon

Categorization

Key Words

Botnet, Casus Belli, Computer Network Attack, COTS Software, Cyber Crime, Cyber Terrorism, Cyber Warfare, Department of Homeland Security, Digital [Cyber] Pearl Harbor, Hacktivism, Laws of War, National Cybersecurity Strategy (U.S.), Organized Crime, SCADA Systems

Synopsis

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas. The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization. Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges.

Additional Notes and Highlights

Expertise required: None


Table of Contents

Introduction

  • Part I. Foundation and Overview
    1. Cyberpower and National Security: Policy Recommendations for a Strategic Framework
      Franklin D. Kramer
    2. From Cyberspace to Cyberpower: Defining the Problem
      Daniel T. Kuehl
    3. Toward a Preliminary Theory of Cyberpower
      Stuart H. Starr
  • Part II. Cyberspace
    1. A Graphical Introduction to the Structural Elements of Cyberspace
      Elihu Zimet and Edward Skoudis
    2. Cyberspace and Infrastructure
      William D. O’Neil
    3. Evolutionary Trends in Cyberspace
      Edward Skoudis
    4. Information Security Issues in Cyberspace
      Edward Skoudis
    5. The Future of the Internet and Cyberpower
      Marjory S. Blumenthal and David D. Clark
    6. Information Technology and the Biotech Revolution
      Edward Skoudis
  • Part III. Cyberpower: Military Use and Deterrence
    1. An Environmental Approach to Understanding Cyberpower
      Gregory J. Rattray
    2. Military Cyberpower
      Martin C. Libicki
    3. Military Service Overview
      Elihu Zimet and Charles L. Barry
    4. Deterrence of Cyber Attacks
      Richard L. Kugler
  • Part IV. Cyberpower: Information
    1. Cyber Influence and International Security
      Franklin D. Kramer and Larry K. Wentz
    2. Tactical Influence Operations
      Stuart H. Starr
    3. I-Power: The Information Revolution and Stability Operations
      Franklin D. Kramer, Larry K. Wentz, and Stuart H. Starr
    4. Facilitating Stability Operations with Cyberpower
      Gerard J. Christman
  • Part V. Cyberpower: Strategic Problems
    1. Cyber Crime
      Clay Wilson
    2. Cyber Terrorism: Menace or Myth?
      Irving Lachow
    3. Nation-state Cyber Strategies: Examples from China and Russia
      Timothy L. Thomas
  • Part VI. Institutional Factors
    1. Internet Governance
      Harold Kwalwasser
    2. International Law and Information Operations
      Thomas C. Wingfield
    3. Cyberpower and Critical Infrastructure Protection: A Critical Assessment of Federal Efforts
      John A. McCarthy with Chris Burrow, Maeve Dion, and Olivia Pacheco
    4. Cyberpower from the Presidential Perspective
      Leon Fuerth


This book is sponsored by The National Defense University.