Cyberdeterrence and Cyberwar [NOOK Book]

Overview


Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Read More Show...
See more details below
Cyberdeterrence and Cyberwar

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$8.49
BN.com price
(Save 14%)$9.95 List Price

Overview


Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Read More Show Less

Product Details

  • ISBN-13: 9780833048752
  • Publisher: RAND Corporation
  • Publication date: 9/22/2009
  • Sold by: Barnes & Noble
  • Format: eBook
  • Pages: 238
  • Sales rank: 1,248,394
  • File size: 3 MB

Table of Contents

Preface iii

Figures ix

Tables xi

Summary xiii

Acknowledgements xxi

Abbreviations xxiii

Chapter 1 Introduction 1

Purpose 5

Basic Concepts and Monograph Organization 6

Chapter 2 A Conceptual Framework 11

The Mechanisms of Cyberspace 12

External Threats 13

Internal Threats 20

Insiders 20

Supply Chain 21

In Sum 22

Defining Cyberattack 23

Defining Cyberdeterrence 27

Chapter 3 Why Cyberdeterrence Is Different 39

Do We Know Who Did It? 41

Can We Hold Their Assets at Risk? 52

Can We Do So Repeatedly? 56

If Retaliation Does Not Deter, Can It at Least Disarm? 59

Will Third Parties Join the Fight? 62

Does Retaliation Send the Right Message to Our Own Side? 64

Do We Have a Threshold for Response? 65

Can We Avoid Escalation? 69

What If the Attacker Has Little Worth Hitting? 70

Yet the Will to Retaliate Is More Credible for Cyberspace 71

A Good Defense Adds Further Credibility 73

Chapter 4 Why the Purpose of the Original Cyberattack Matters 75

Error 76

Oops 76

No, You Started It 77

Rogue Operators 78

The Command-and-Control Problem 78

Coercion 79

Force 82

Other 86

Implications 90

Chapter 5 A Strategy of Response 91

Should the Target Reveal the Cyberattack? 92

When Should Attribution Be Announced? 93

Should Cyberretaliation Be Obvious? 94

Is Retaliation Better Late Than Never? 96

Retaliating Against State-Tolerated Freelance Hackers 98

What About Retaliating Against CNE? 102

Should Deterrence Be Extended to Friends? 104

Should a Deterrence Policy Be Explicit? 106

Can Insouciance Defeat the Attackers Strategy? 108

Confrontation Without Retaliation 109

The Attackers Perspective 112

Signaling to a Close114

Chapter 6 Strategic Cyberwar 117

The Purpose of Cyberwar 118

The Plausibility of Cyberwar 121

The Limits of Cyberwar 122

The Conduct of Cyberwar 125

Cyberwar as a Warning Against Cyberwar 126

Preserving a Second-Strike Capability 127

Sub-Rosa Cyberwar? 128

A Government Role in Defending Against Cyberwar 129

Managing the Effects of Cyberwar 131

Terminating Cyberwar 135

Conclusions 137

Chapter 7 Operational Cyberwar 139

Cyberwar as a Bolt from the Blue 143

Dampening the Ardor for Network-Centric Operations 149

Attacks on Civilian Targets 153

Organizing for Operational Cyberwar 154

Conclusions 158

Chapter 8 Cyberdefense 159

The Goal of Cyberdefense 160

Architecture 165

Policy 167

Strategy 169

Operations 170

Hardware 171

Deception 171

Red Teaming 173

Conclusions 173

Chapter 9 Tricky Terrain 175

Appendixes 179

A What Constitutes an Act of War in Cyberspace? 179

B The Calculus of Explicit Versus Implicit Deterrence 183

C The Dim Prospects for Cyber Arms Control 199

References 203

Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted November 27, 2012

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)