Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
22
result(s) for
"Cyberspace Security measures History."
Sort by:
The Decision to Attack
by
Aaron Franklin Brantly
in
Cyberspace
,
Cyberspace -- Security measures -- Government policy -- United States
,
Decision making
2016
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain.
With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility–rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
Discussed:
The Key Concepts of Cyber
The Motivation and Utility for Covert Action
Digital Power
Anonymity and Attribution in Cyberspace
Cyber and Conventional Operations:
The Dynamics of Conflict
Defining the Role of Intelligence in Cyberspace
How Actors Decide to Use Cyber—a Rational
Choice Approach
Cognitive Processes and Decision-Making
in Cyberspace
Finding Meaning in the Expected Utility of
International Cyber Conflict
Cyber warfare : a reference handbook
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
by
National Research Council (U.S.). Computer Science and Telecommunications Board
,
Dam, Kenneth W.
,
National Research Council (U.S.). Committee on Offensive Information Warfare
in
Computer networks
,
Computer networks -- Security measures -- Government policy -- United States
,
Computer networks -- Security measures -- United States
2009
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy.
Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues.
Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.
Dawn of the code war : America's battle against Russia, China, and the rising global cyber threat
\"Over the past decade, there have been a series of Internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more ... John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this ... book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties--smart appliances, artificial intelligence, self-driving cars--with little regard for how our enemies might compromise them\"--Provided by publisher.
Wars of Disruption and Resilience
2011
Increasingly, the power of a large, complex, wired nation like the United States rests on its ability to disrupt would-be cyber attacks and to be resilient against a successful attack or recurring campaign. Addressing the concerns of both theorists and those on the national security front lines, Chris C. Demchak presents a unified strategy for survival in an interconnected, ever-messier, more surprising cybered world and examines the institutional adaptations required of our defense, intelligence, energy, and other critical sectors for national security. Demchak introduces a strategy of \"security resilience\" against surprise attacks for a cybered world that is divided between modern, digitally vulnerable city-states and more dysfunctional global regions. Its key concepts build on theories of international relations, complexity in social-technical systems, and organizational-institutional adaptation. Demchak tests the strategy for reasonableness in history's few examples of states disrupting rather than conquering and being resilient to attacks, including ancient Athens and Sparta, several British colonial wars, and two American limited wars. She applies the strategy to modern political, social, and technical challenges and presents three kinds of institutional adaptation that predicate the success of the security resilience strategy in response. Finally, Demchak discusses implications for the future including new forms of cyber aggression like the Stuxnet worm, the rise of the cyber-command concept, and the competition between the U.S. and China as global cyber leaders. Wars of Disruption and Resilience offers a blueprint for a national cyber-power strategy that is long in time horizon, flexible in target and scale, and practical enough to maintain the security of a digitized nation facing violent cybered conflict.
Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities
2014
Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.
Journal Article
Routledge Handbook of International Cybersecurity
by
Tikk, Eneken
,
Kerttunen, Mika
in
Computer networks
,
Computer networks -- Security measures -- Government policy
,
Computer security
2020
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security.
Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development.
The volume is split into four thematic sections:
Concepts and frameworks;
Challenges to secure and peaceful cyberspace;
National and regional perspectives on cybersecurity;
Global approaches to cybersecurity.
This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.
The Virtual Weapon and International Order
2017
An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international orderThe cyber revolution istherevolution of our time. The rapid expansion of cyberspace brings both promise and peril. It promotes new modes of political interaction, but it also disrupts interstate dealings and empowers non-state actors who may instigate diplomatic and military crises. Despite significant experience with cyber phenomena, the conceptual apparatus to analyze, understand, and address their effects on international order remains primitive. Here, Lucas Kello adapts and applies international relations theory to create new ways of thinking about cyber strategy.Kello draws on a broad range of case studies, including the Estonian crisis, the Olympic Games operation against Iran, and the cyber attack against Sony Pictures. Synthesizing qualitative data from government documents, forensic reports of major incidents and interviews with senior officials from around the globe, this important work establishes new conceptual benchmarks to help security experts adapt strategy and policy to the unprecedented challenges of our times.
North Korea's cyber operations
by
Sohn, Ethan
,
LaFoy, Scott
,
Jun, Jenny
in
Cyberspace operations (Military science)
,
Information technology
,
International Security
2016
This report presents an open source analysis of North Korea's cyber operations capabilities and its strategic implications for the United States and South Korea. The purpose is to mitigate the current knowledge gap among various academic and policy communities on the topic by synthesizing authoritative and comprehensive open source reference material. The report is divided into three chapters, the first chapter examining North Korea's cyber strategy. The authors then provide an assessment of North Korea's cyber operations capabilities by examining the organizational structure, history, and functions of North Korea's cyber units, their supporting educational training and technology base, and past cyber attacks widely attributed to North Korea. This assessment is followed by a discussion on policy implications for U.S. and ROK policymakers and the larger security community.