|
Showing 1 - 4 of
4 matches in All Departments
While the deterrence of cyber attacks is one of the most important
issues facing the United States and other nations, the application
of deterrence theory to the cyber realm is problematic. This study
introduces cyber warfare and reviews the challenges associated with
deterring cyber attacks, offering key recommendations to aid the
deterrence of major cyber attacks.
This book examines the shape, sources and dangers of information
warfare (IW) as it pertains to military, diplomatic and civilian
stakeholders. Cyber warfare and information warfare are different
beasts. Both concern information, but where the former does so
exclusively in its digitized and operationalized form, the latter
does so in a much broader sense: with IW, information itself is the
weapon. The present work aims to help scholars, analysts and
policymakers understand IW within the context of cyber conflict.
Specifically, the chapters in the volume address the shape of
influence campaigns waged across digital infrastructure and in the
psychology of democratic populations in recent years by belligerent
state actors, from the Russian Federation to the Islamic Republic
of Iran. In marshalling evidence on the shape and evolution of IW
as a broad-scoped phenomenon aimed at societies writ large, the
authors in this book present timely empirical investigations into
the global landscape of influence operations, legal and strategic
analyses of their role in international politics, and insightful
examinations of the potential for democratic process to overcome
pervasive foreign manipulation. This book will be of much interest
to students of cybersecurity, national security, strategic studies,
defence studies and International Relations in general.
This book examines the shape, sources and dangers of information
warfare (IW) as it pertains to military, diplomatic and civilian
stakeholders. Cyber warfare and information warfare are different
beasts. Both concern information, but where the former does so
exclusively in its digitized and operationalized form, the latter
does so in a much broader sense: with IW, information itself is the
weapon. The present work aims to help scholars, analysts and
policymakers understand IW within the context of cyber conflict.
Specifically, the chapters in the volume address the shape of
influence campaigns waged across digital infrastructure and in the
psychology of democratic populations in recent years by belligerent
state actors, from the Russian Federation to the Islamic Republic
of Iran. In marshalling evidence on the shape and evolution of IW
as a broad-scoped phenomenon aimed at societies writ large, the
authors in this book present timely empirical investigations into
the global landscape of influence operations, legal and strategic
analyses of their role in international politics, and insightful
examinations of the potential for democratic process to overcome
pervasive foreign manipulation. This book will be of much interest
to students of cybersecurity, national security, strategic studies,
defence studies and International Relations in general.
Former secretary of defense Leon Panetta once described cyber
warfare as "the most serious threat in the twenty-first century,"
capable of destroying our entire infrastructure and crippling the
nation. Already, major cyber attacks have affected countries around
the world: Estonia in 2007, Georgia in 2008, Iran in 2010, and most
recently the United States. As with other methods of war, cyber
technology can be used not only against military forces and
facilities but also against civilian targets. Information
technology has enabled a new method of warfare that is proving
extremely difficult to combat, let alone defeat. And yet cyber
warfare is still in its infancy, with innumerable possibilities and
contingencies for how such conflicts may play out in the coming
decades. Brian M. Mazanec examines the worldwide development of
constraining norms for cyber war and predicts how those norms will
unfold in the future. Employing case studies of other
emerging-technology weapons-chemical and biological, strategic
bombing, and nuclear weaponry-Mazanec expands previous
understandings of norm-evolution theory, offering recommendations
for U.S. policymakers and citizens alike as they grapple with the
reality of cyber terrorism in our own backyard.
|
You may like...
Tenet
John David Washington, Robert Pattinson, …
DVD
(1)
R51
Discovery Miles 510
Cold Pursuit
Liam Neeson, Laura Dern
Blu-ray disc
R39
Discovery Miles 390
|