The Cyber Threat and Globalization : The Impact on U.S. National and International Security /: The Impact on U.S. National and International Security. ([2018])
- Record Type:
- Book
- Title:
- The Cyber Threat and Globalization : The Impact on U.S. National and International Security /: The Impact on U.S. National and International Security. ([2018])
- Main Title:
- The Cyber Threat and Globalization : The Impact on U.S. National and International Security
- Further Information:
- Note: Jack A. Jarmon, Pano Yannakogeorgos.
- Authors:
- Jarmon, Jack A, 1951-
Yannakogeorgos, Pano - Contents:
- Title; Copyright; Contents; Preface; 1 Defining Cyberspace; A World at War with Itself; What, Then, Is Cyber?; The History of the Internet; Unfettered Growth and Challenges; Information Technology versus Operational Technology; Vulnerabilities; The Internet of Things (IoT); Cloud Computing; A Two-Edged Sword; The Next-Generation Internet (IPv6); Cybersecurity; Overview of the Attack Matrix; 2 The Mutable Domain; What Is Cryptology?; Exploiting the System; The Onion Router (TOR); Attackers, Facilitators, Defenders, and Targets; Malware; Cryptocurrencies; Advanced Persistent Threat (APT) The Deep and Dark WebsThe Lexicon of Cyber Conflict; 3 Global Cyber Risk and Access Vectors; The Globalization Process; Motives and Sources of Attack; Policy Lagging Technology; The "Sordid Boon" of Social Media; Algorithms, Software, Audience Mapping, and Targeted Messaging; "Swarmcasting"-Terrorists, Protesters, and Hired Guns; "Psyber Warfare"; Broadband Mobility; 4 China; Market Ownership: Controlling the Rules and Physics of the Domain; Nation-State Economic Espionage; Ancient Traditions and Modern Realities; "Win Victory before the First Battle" Abroad and at Home Organization and MissionsEspionage for National Security and Economic Advantage-"Know Yourself, Know Your Enemy"; Espionage for National Security and Military Advantage-"Kill with a Borrowed Sword"; Information Control for Regime Stability; The "Great Firewall" and the "Great Cannon"-the Cyber Janus; PLA Reform and theTitle; Copyright; Contents; Preface; 1 Defining Cyberspace; A World at War with Itself; What, Then, Is Cyber?; The History of the Internet; Unfettered Growth and Challenges; Information Technology versus Operational Technology; Vulnerabilities; The Internet of Things (IoT); Cloud Computing; A Two-Edged Sword; The Next-Generation Internet (IPv6); Cybersecurity; Overview of the Attack Matrix; 2 The Mutable Domain; What Is Cryptology?; Exploiting the System; The Onion Router (TOR); Attackers, Facilitators, Defenders, and Targets; Malware; Cryptocurrencies; Advanced Persistent Threat (APT) The Deep and Dark WebsThe Lexicon of Cyber Conflict; 3 Global Cyber Risk and Access Vectors; The Globalization Process; Motives and Sources of Attack; Policy Lagging Technology; The "Sordid Boon" of Social Media; Algorithms, Software, Audience Mapping, and Targeted Messaging; "Swarmcasting"-Terrorists, Protesters, and Hired Guns; "Psyber Warfare"; Broadband Mobility; 4 China; Market Ownership: Controlling the Rules and Physics of the Domain; Nation-State Economic Espionage; Ancient Traditions and Modern Realities; "Win Victory before the First Battle" Abroad and at Home Organization and MissionsEspionage for National Security and Economic Advantage-"Know Yourself, Know Your Enemy"; Espionage for National Security and Military Advantage-"Kill with a Borrowed Sword"; Information Control for Regime Stability; The "Great Firewall" and the "Great Cannon"-the Cyber Janus; PLA Reform and the Strategic Support Force; Mutually Assured Deterrence; U.S.-Chinese Positive Engagement: Dialogue for Cyber Stability; Building toward a Cooperative Spirit; Beyond the Rhetoric; Conclusion; 5 Russia; Estonia, 2007 "There Are No Absolute Rules of Conduct, Either in Peace or War"-Leon TrotskyGeorgia, 2008; Net Warriors; Ukraine; The United States; "What Is to Be Done?"; 6 Violent Extremist Organizations and Terrorism in the Cyber Domain; Definitions; A Spectrum of Cyber-Enabled Terrorist Operations; Cyber-Enabled Recruitment and Radicalization; Phases of Internet Radicalization; Planning, Command, Control, and Communications; Armed Attack; Cyber Target: Industrial Control Systems; "Psyber Operations"; A Hypothetical Case of Strategic Cyberterrorism; Conclusion; 7 Public-Private Partnerships The Information Society: An Emerging Societal ConstructA Global Culture of Cyber Security for the Information Society; World Summit on the Information Society and Internet Governance Forum; The Perils of Private Ordering: Network Effects, Trust, and Community Harm; Conclusion; 8 Cyber Horizons; Big Data; Artificial Intelligence; Robotics and AI; Machine Learning; Third Offset Strategy; Distributed Ledger Technology; Conclusion; Appendix: Strategic Military Cyber Concepts; Cyber Law and Policy, by Col. Gary Brown and Maj. Israel King; North Korean Cyber, by Adam Albarado … (more)
- Publisher Details:
- Lanham, Maryland : Rowman & Littlefield
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Political Science: Intelligence & Espionage
COMPUTERS / Security / General
Political Science: Terrorism
Cyber intelligence (Computer security)
Cyberterrorism
National security -- United States
Security, International
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9781538104323
1538104326 - Related ISBNs:
- 9781538104309
9781538104316 - Notes:
- Note: Includes bibliographical references and index.
Note: Online resource; title from PDF title page (EBSCO, viewed May 30, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.287291
- Ingest File:
- 02_327.xml