Internet Governance in an Age of Cyber Insecurity [NOOK Book]

Overview

The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than $1 trillion, while coordinated cyberattacks have crippled Estonia, Georgia, and Kyrgyzstan and compromised critical infrastructure in countries around the world. While no fewer than six UN bodies and multiple regional and ...
See more details below
Internet Governance in an Age of Cyber Insecurity

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$2.99
BN.com price

Overview

The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than $1 trillion, while coordinated cyberattacks have crippled Estonia, Georgia, and Kyrgyzstan and compromised critical infrastructure in countries around the world. While no fewer than six UN bodies and multiple regional and national forums have sought to build a consensus on the future of Internet governance, there has been little progress thus far. The United States has largely abstained from these discussions, instead focusing on developing its own offensive and defensive cybersecurity capabilities while entrusting the ongoing stability of the system to the expertise of the private sector. In this Council Special Report, Robert K. Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes. Internet Governance in an Age of Cyber Insecurity is a timely contribution on an issue increasingly capturing the attention of policymakers. It presents technical ideas to the nonexpert in accessible and compelling language. The report leaves little doubt about the importance of cybersecurity to the future of both the United States and the Internet itself, and its recommendations provide a strong foundation for future action.
Read More Show Less

Product Details

  • ISBN-13: 9780876094914
  • Publisher: Council on Foreign Relations
  • Publication date: 9/1/2010
  • Sold by: Barnes & Noble
  • Format: eBook
  • Pages: 48
  • File size: 450 KB

Meet the Author

Robert K. Knake is an international affairs fellow in residence at the Council on Foreign Relations studying cyber war. Prior to his fellowship, he was a principal at Good Harbor Consulting, LLC, a security strategy consulting firm with offices in Washington, DC; Boston; and Abu Dhabi, where he served domestic and foreign clients on cybersecurity and homeland security projects. During the 2008 presidential campaign, Knake coordinated the Counterterrorism Task Force for the Obama campaign and served on the Homeland Security Task Force. Following the election of President Barack Obama, Knake served on the presidential transition team at the U.S. Department of Homeland Security and authored the agency review team's final report. Knake joined Good Harbor after earning his MA from Harvard University's Kennedy School of Government. He has been quoted widely as an expert on cybersecurity and has appeared as a speaker or panelist at numerous events on cybersecurity, including DEFCON and the annual meeting of the American Bar Association. In July 2010, he testified before Congress on the role of attribution in deterring cyberattacks. In 2006, Knake and CFR Senior Fellow Steven Simon directed the Century Foundation Task Force report, The Forgotten Homeland. Knake is coauthor (with former chair of the U.S. Counterterrorism Security Group Richard A. Clarke) of Cyber War: The Next Threat to National Security and What to Do About It.
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)