Cyberpower and National Security: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 61: Line 61:
Expertise required: None
Expertise required: None


[http://www.potomacbooksinc.com/resrcs/tocs/1597974234_TOC.pdf Table of Contents (PDF)]
'''Table of Contents'''
 


*Part I. Foundation and Overview
*Part I. Foundation and Overview
Line 75: Line 74:
# The Future of the Internet and Cyberpower (Marjory S. Blumenthal and David D. Clark)
# The Future of the Internet and Cyberpower (Marjory S. Blumenthal and David D. Clark)
# Information Technology and the Biotech Revolution (Edward Skoudis)
# Information Technology and the Biotech Revolution (Edward Skoudis)
 
* Part III. Cyberpower: Military Use and Deterrence
 
# An Environmental Approach to Understanding Cyberpower
 
Gregory J. Rattray 253
# Military Cyberpower
Martin C. Libicki 275
# Military Service Overview
Elihu Zimet and Charles L. Barry 285
# Deterrence of Cyber Attacks
Richard L. Kugler 309
* Part IV. Cyberpower: Information
# Cyber Influence and International Security
Franklin D. Kramer and Larry K. Wentz 343
# Tactical Influence Operations
Stuart H. Starr 362
# I-Power: The Information Revolution and Stability Operations
Franklin D. Kramer, Larry K. Wentz, and Stuart H. Starr 373
# Facilitating Stability Operations with Cyberpower
Gerard J. Christman 392
* Part V. Cyberpower: Strategic Problems
# Cyber Crime
Clay Wilson 415
# Cyber Terrorism: Menace or Myth?
Irving Lachow 437
# Nation-state Cyber Strategies: Examples from China and Russia
Timothy L. Thomas 465
* Part VI. Institutional Factors
# Internet Governance
Harold Kwalwasser



Revision as of 13:38, 9 July 2010

Full Title of Reference

Cyberpower and National Security

Full Citation

Cyberpower and National Security (Franklin D. Kramer, Stuart H. Starr & Larry Wentz eds., 2009). Purchase

BibTeX

Categorization

Key Words

Botnet, Casus Belli, Computer Network Attack, COTS Software, Cyber Crime, Cyber Terrorism, Cyber Warfare, Department of Homeland Security, Digital [Cyber] Pearl Harbor, Hacktivism, Laws of War, National Cybersecurity Strategy (U.S.), Organized Crime, SCADA Systems

Synopsis

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas. The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization. Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges.

Additional Notes and Highlights

Expertise required: None

Table of Contents

  • Part I. Foundation and Overview
  1. Cyberpower and National Security: Policy Recommendations for a Strategic Framework (Franklin D. Kramer)
  2. From Cyberspace to Cyberpower: Defining the Problem (Daniel T. Kuehl)
  3. Toward a Preliminary Theory of Cyberpower (Stuart H. Starr)
  • Part II. Cyberspace
  1. A Graphical Introduction to the Structural Elements of Cyberspace (Elihu Zimet and Edward Skoudis)
  2. Cyberspace and Infrastructure (William D. O’Neil)
  3. Evolutionary Trends in Cyberspace (Edward Skoudis)
  4. Information Security Issues in Cyberspace (Edward Skoudis)
  5. The Future of the Internet and Cyberpower (Marjory S. Blumenthal and David D. Clark)
  6. Information Technology and the Biotech Revolution (Edward Skoudis)
  • Part III. Cyberpower: Military Use and Deterrence
  1. An Environmental Approach to Understanding Cyberpower

Gregory J. Rattray 253

  1. Military Cyberpower

Martin C. Libicki 275

  1. Military Service Overview

Elihu Zimet and Charles L. Barry 285

  1. Deterrence of Cyber Attacks

Richard L. Kugler 309

  • Part IV. Cyberpower: Information
  1. Cyber Influence and International Security

Franklin D. Kramer and Larry K. Wentz 343

  1. Tactical Influence Operations

Stuart H. Starr 362

  1. I-Power: The Information Revolution and Stability Operations

Franklin D. Kramer, Larry K. Wentz, and Stuart H. Starr 373

  1. Facilitating Stability Operations with Cyberpower

Gerard J. Christman 392

  • Part V. Cyberpower: Strategic Problems
  1. Cyber Crime

Clay Wilson 415

  1. Cyber Terrorism: Menace or Myth?

Irving Lachow 437

  1. Nation-state Cyber Strategies: Examples from China and Russia

Timothy L. Thomas 465

  • Part VI. Institutional Factors
  1. Internet Governance

Harold Kwalwasser


Introduction (PDF)

Chapter 23 Cyberpower and Critical Infrastructure Protection (PDF)

This book is sponsored by The National Defense University.