Cybersecurity and Cyberwar: What Everyone Needs to Know

( 2 )

Overview


Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents ...
See more details below
Other sellers (Hardcover)
  • All (4) from $59.34   
  • New (3) from $63.66   
  • Used (1) from $59.34   
Cybersecurity and Cyberwar: What Everyone Needs to KnowRG

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$9.49
BN.com price
(Save 13%)$10.99 List Price

Overview


Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict.

In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.

Read More Show Less

Editorial Reviews

From the Publisher

"...an impressive tour de force, Cybersecurity and Cyberwarfare gives us actual case studies, insider interviews, bizarre trivia, and a lot of dramatic statistics to help demystify the danger, and there is real danger. The timely book brings thoughtful, witty, and balanced analysis to this very important emerging discussion...it's a book I wish I had written." --Patrick Lin, The Atlantic

"If you're completely ignorant about malware and cyberattacks, this is the book for you. And if you think you know a lot about these topics, this is still the book for you. It's thorough, exhaustive, and easy to read...extremely approachable." --Mashable

"In confronting the cybersecurity problem, it's important for all of us to become knowledgeable and involved. This book makes that possible -- and also fascinating. It's everything you need to know about cybersecurity, wonderfully presented in a clear and smart way."--Walter Isaacson, author of Steve Jobs

"If you read only one book about 'all this cyberstuff,' make it this one. Singer and Friedman know how to make even the most complicated material accessible and even entertaining, while at the same time making a powerful case for why all of us need to know more and think harder about the (cyber)world we know live in."--Anne-Marie Slaughter, President, the New America Foundation

"Singer and Friedman blend a wonderfully easy to follow FAQ format with engaging prose, weaving explanations of the elements of cybersecurity with revealing anecdotes. From the fundamentals of Internet architecture to the topical intrigue of recent security leaks, this book provides an accessible and enjoyable analysis of the current cybersecurity landscape and what it could look like in the future."--Jonathan Zittrain, Professor of Law and Professor of Computer Science at Harvard University, and author of The Future of the Internet-And How to Stop It

"Singer and Friedman do a highly credible job of documenting the present and likely future risky state of cyber-affairs. This is a clarion call."--Vint Cerf, "Father of the Internet," Presidential Medal of Freedom winner

"I loved this book. Wow. Until I read this astonishing and important book, I didn't know how much I didn't know about the hidden world of cybersecurity and cyberwar. Singer and Friedman make comprehensible an impossibly complex subject, and expose the frightening truth of just how vulnerable we are. Understanding these often-invisible threats to our personal and national security is a necessary first step toward defending ourselves against them. This is an essential read."--Howard Gordon, Executive Producer of 24 and co-creator of Homeland

"In our digital age, the issues of cybersecurity are no longer just for the technology crowd; they matter to us all. Whether you work in business or politics, the military or the media-or are simply an ordinary citizen-this is an essential read."--Eric Schmidt, Executive Chairman, Google

"This is the most approachable and readable book ever written on the cyber world. The authors have distilled the key facts and policy, provided sensible recommendations, and opened the debate generally to any informed citizen: a singular achievement. A must read for practitioners and scholars alike."--Admiral James Stavridis, U.S. Navy (Ret), former Supreme Allied Commander at NATO

From the Publisher

"...an impressive tour de force, Cybersecurity and Cyberwar gives us actual case studies, insider interviews, bizarre trivia, and a lot of dramatic statistics to help demystify the danger, and there is real danger. The timely book brings thoughtful, witty, and balanced analysis to this very important emerging discussion...it's a book I wish I had written." --Patrick Lin, The Atlantic

"If you're completely ignorant about malware and cyberattacks, this is the book for you. And if you think you know a lot about these topics, this is still the book for you. It's thorough, exhaustive, and easy to read...extremely approachable." --Mashable

"In confronting the cybersecurity problem, it's important for all of us to become knowledgeable and involved. This book makes that possible -- and also fascinating. It's everything you need to know about cybersecurity, wonderfully presented in a clear and smart way."--Walter Isaacson, author of Steve Jobs

"If you read only one book about 'all this cyberstuff,' make it this one. Singer and Friedman know how to make even the most complicated material accessible and even entertaining, while at the same time making a powerful case for why all of us need to know more and think harder about the (cyber)world we know live in."--Anne-Marie Slaughter, President, the New America Foundation

"Singer and Friedman blend a wonderfully easy to follow FAQ format with engaging prose, weaving explanations of the elements of cybersecurity with revealing anecdotes. From the fundamentals of Internet architecture to the topical intrigue of recent security leaks, this book provides an accessible and enjoyable analysis of the current cybersecurity landscape and what it could look like in the future."--Jonathan Zittrain, Professor of Law and Professor of Computer Science at Harvard University, and author of The Future of the Internet-And How to Stop It

"Singer and Friedman do a highly credible job of documenting the present and likely future risky state of cyber-affairs. This is a clarion call."--Vint Cerf, "Father of the Internet," Presidential Medal of Freedom winner

"I loved this book. Wow. Until I read this astonishing and important book, I didn't know how much I didn't know about the hidden world of cybersecurity and cyberwar. Singer and Friedman make comprehensible an impossibly complex subject, and expose the frightening truth of just how vulnerable we are. Understanding these often-invisible threats to our personal and national security is a necessary first step toward defending ourselves against them. This is an essential read."--Howard Gordon, Executive Producer of 24 and co-creator of Homeland

"In our digital age, the issues of cybersecurity are no longer just for the technology crowd; they matter to us all. Whether you work in business or politics, the military or the media-or are simply an ordinary citizen-this is an essential read."--Eric Schmidt, Executive Chairman, Google

"This is the most approachable and readable book ever written on the cyber world. The authors have distilled the key facts and policy, provided sensible recommendations, and opened the debate generally to any informed citizen: a singular achievement. A must read for practitioners and scholars alike."--Admiral James Stavridis, U.S. Navy (Ret), former Supreme Allied Commander at NATO

Read More Show Less

Product Details

  • ISBN-13: 9780199918096
  • Publisher: Oxford University Press
  • Publication date: 1/3/2014
  • Series: What Everyone Needs to Know Series
  • Pages: 320
  • Sales rank: 826,866
  • Product dimensions: 5.60 (w) x 8.40 (h) x 0.90 (d)

Meet the Author

Peter W. Singer is a Senior Fellow and the Director of the 21st Century Defense Initiative at the Brookings Institution.
Allan Friedman is a Fellow in Governance Studies and Research Director of the Center for Technology Innovation at the Brookings Institution.

Read More Show Less

Table of Contents

1. Why cyberspace is wonderful ... and complicated
§ What is cyberspace?
§ Why do people talk about the difference of a networked world?
§ How does the Internet actually work?
§ Who owns this thing?
§ WaitEL You mean no one runs the internet?
§ What can governments do online? What are the limits of state power?
§ Just how dependent are we on cyberspace?

2. Security and Insecurity Online
§ What do we mean by a "secure" system?
§ What is the difference between an attack on a network and an attack on a system?
§ How does anti-virus software work?
§ How do you defend a network?
§ Why is anonymity a problem online? Why is it relatively easy to act without accountability?
§ How can you authenticate some one to be sure they are who they say they are?
§ How do we keep data secure in cyberspace?

3. Threats and Bad Actors o Differentiating threats o Value at risk
§ What are the bad guys after? What can you really do with a computer?
§ What's the worst you can do? Can a hacker really turn off the power grid?
o Different motivations of attackers o Different types of attacks o What is Cyber Terrorism, actually?
§ What does "cyberwarfare" mean?
§ How are countries militarizing cyberspace? Why?
§ So if we just built better systems, could we have a secure internet?

4. Case Studies / Examples of attacks o Aurora / Google {phishing, attribution}
o Stuxnet {Critical infrastructure, intelligence}
o Wikileaks data breach & fallout {data protection, DoS}
o Israel-Syria Air Defense {Cyber-Kinetic Crossover, cyberwar}
-

5. Why securing cyberspace is hard
§ What are some mechanisms that enable us to trust systems or data?
§ What is the difference between espionage and exploitation?
§ Why not just write better software?
§ Why can't network operators detect bad behavior?
§ Why security through obscurity doesn't work
§ How do we know what has happened after a cyber incident?
§ How does the rise in "cloud computing" change the dynamics of cyber security?
§ What makes mobile computing different?
§ If everyone's systems are vulnerable, can't defenders just interrupt the attacker's systems?
§ Why is it so hard to know who the attackers are?
§ Why does attribution matter?
§ How do we measure a cyber risk?
§ Why aren't users able to protect themselves?
§ Don't vendors and service providers have enough incentives to provide good security?
§ Why aren't companies investing enough to protect themselves?

6. International Dimensions
§ What changes when cyber problems cross international borders?
§ How do countries differ in their approach to cyberspace?
§ Who has the biggest cyber armies?
§ What constitutes an act of war?
§ How does law enforcement deal with international boundaries?
§ What are existing international organizations currently doing?
§ What international treaties are in place?
§ Why don't the classic models of military deterrence work for cyberspace?
§ What are the obstacles to international cooperation to resolve cybersecurity issues?

7.The path forward to a more secure cyberspace
§ It sounds like every aspect of modern life is vulnerable. Are things really that bad?
§ Why can't we just re-built the technology to prevent bad behavior?
§ Can we impose accountability through national control of cyberspace?
§ How can private firms be incentivized to internalize their risk?
§ If a company or government agency was willing to invest in cyber security defenses, what would stand in their way?
§ Can internet service providers do more to identity and stop bad behavior?
§ How can we make it harder for bad actors to profit from successful attacks
§ What can I do to protect myself?

Read More Show Less

Customer Reviews

Average Rating 5
( 2 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted April 19, 2014

    Cd 4747'/%+

    Be

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 1, 2014

    Fad Great resd Great read

    Great read. Useful, fun, informative and entertaining all in one

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)