Cyberpower and National Security: Difference between revisions
Line 62: | Line 62: | ||
[http://www.potomacbooksinc.com/resrcs/tocs/1597974234_TOC.pdf '''Table of Contents'''] | [http://www.potomacbooksinc.com/resrcs/tocs/1597974234_TOC.pdf [['''Table of Contents''']]] | ||
[http://www.potomacbooksinc.com/resrcs/frontm/1597974234_intro.pdf Introduction] | [http://www.potomacbooksinc.com/resrcs/frontm/1597974234_intro.pdf Introduction] |
Revision as of 14:11, 9 July 2010
Full Title of Reference
Cyberpower and National Security
Full Citation
Cyberpower and National Security (Franklin D. Kramer, Stuart H. Starr & Larry Wentz eds., 2009). Purchase
Categorization
- Overview: Books
- Threats and Actors: Electricity, Oil and Natural Gas; Public Data Networks; The Threat and Skeptics
- Issues: Attribution; Cybercrime; Public-Private Cooperation;
Key Words
Botnet, Casus Belli, Computer Network Attack, COTS Software, Cyber Crime, Cyber Terrorism, Cyber Warfare, Department of Homeland Security, Digital [Cyber] Pearl Harbor, Hacktivism, Laws of War, National Cybersecurity Strategy (U.S.), Organized Crime, SCADA Systems
Synopsis
The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas. The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization. Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges.
Additional Notes and Highlights
Expertise required: None
- Part I. Foundation and Overview
- Cyberpower and National Security: Policy Recommendations for a Strategic Framework
Franklin D. Kramer - From Cyberspace to Cyberpower: Defining the Problem
Daniel T. Kuehl - Toward a Preliminary Theory of Cyberpower
Stuart H. Starr
- Cyberpower and National Security: Policy Recommendations for a Strategic Framework
- Part II. Cyberspace
- A Graphical Introduction to the Structural Elements of Cyberspace
Elihu Zimet and Edward Skoudis - Cyberspace and Infrastructure
William D. O’Neil - Evolutionary Trends in Cyberspace
Edward Skoudis - Information Security Issues in Cyberspace
Edward Skoudis - The Future of the Internet and Cyberpower
Marjory S. Blumenthal and David D. Clark - Information Technology and the Biotech Revolution
Edward Skoudis
- A Graphical Introduction to the Structural Elements of Cyberspace
- Part III. Cyberpower: Military Use and Deterrence
- An Environmental Approach to Understanding Cyberpower
Gregory J. Rattray - Military Cyberpower
Martin C. Libicki - Military Service Overview
Elihu Zimet and Charles L. Barry - Deterrence of Cyber Attacks
Richard L. Kugler
- An Environmental Approach to Understanding Cyberpower
- Part IV. Cyberpower: Information
- Cyber Influence and International Security
Franklin D. Kramer and Larry K. Wentz - Tactical Influence Operations
Stuart H. Starr - I-Power: The Information Revolution and Stability Operations
Franklin D. Kramer, Larry K. Wentz, and Stuart H. Starr - Facilitating Stability Operations with Cyberpower
Gerard J. Christman
- Cyber Influence and International Security
- Part V. Cyberpower: Strategic Problems
- Cyber Crime
Clay Wilson - Cyber Terrorism: Menace or Myth?
Irving Lachow - Nation-state Cyber Strategies: Examples from China and Russia
Timothy L. Thomas
- Cyber Crime
- Part VI. Institutional Factors
- Internet Governance
Harold Kwalwasser - International Law and Information Operations
Thomas C. Wingfield - Cyberpower and Critical Infrastructure Protection: A Critical Assessment of Federal Efforts
John A. McCarthy with Chris Burrow, Maeve Dion, and Olivia Pacheco - Cyberpower from the Presidential Perspective
Leon Fuerth
- Internet Governance
This book is sponsored by The National Defense University.