Cargando…

Cyber Threats and Nuclear Weapons /

The technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lin, Herbert (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Stanford, CA : Stanford University Press, [2021]
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000nam a22000005i 4500
001 DEGRUYTERUP_9781503630406
003 DE-B1597
005 20221201113901.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 221201t20212021cau fo d z eng d
010 |a 2021021374 
020 |a 9781503630406 
024 7 |a 10.1515/9781503630406  |2 doi 
035 |a (DE-B1597)609947 
035 |a (OCoLC)1251737513 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a cau  |c US-CA 
050 0 0 |a U264.3  |b .L56 2021 
050 4 |a UA23  |b .L56 2021 
072 7 |a POL012000  |2 bisacsh 
082 0 4 |a 355.02170973  |2 23 
100 1 |a Lin, Herbert,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Cyber Threats and Nuclear Weapons /  |c Herbert Lin. 
264 1 |a Stanford, CA :   |b Stanford University Press,   |c [2021] 
264 4 |c ©2021 
300 |a 1 online resource (216 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Contents --   |t Preface --   |t 1 Introduction and Background --   |t 2 The Cyber-Nuclear Connection --   |t 3 The U.S. Nuclear Enterprise --   |t 4 Cybersecurity Lessons for Nuclear Modernization --   |t 5 Cyber Risks in Selected Nuclear Scenarios --   |t 6 Designing the Cyber-Nuclear Future: Observations and Imperatives --   |t 7 Moving Forward --   |t Notes --   |t Bibliography --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a The technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before. This book is the first to confront these risks comprehensively. With Cyber Threats and Nuclear Weapons, Herbert Lin provides a clear-eyed breakdown of the cyber risks to the U.S. nuclear enterprise. Featuring a series of scenarios that clarify the intersection of cyber and nuclear risk, this book guides readers through a little-understood element of the risk profile that government decision-makers should be anticipating. What might have happened if the Cuban Missile Crisis took place in the age of Twitter, with unvetted information swirling around? What if an adversary announced that malware had compromised nuclear systems, clouding the confidence of nuclear decision-makers? Cyber Threats and Nuclear Weapons, the first book to consider cyber risks across the entire nuclear enterprise, concludes with crucial advice on how government can manage the tensions between new nuclear capabilities and increasing cyber risk. This is an invaluable handbook for those ready to confront the unique challenges of cyber nuclear risk. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022) 
650 0 |a Command and control systems  |x Security measures  |z United States. 
650 0 |a Computer security  |z United States. 
650 0 |a Cyberspace operations (Military science)  |z United States. 
650 0 |a Nuclear weapons  |x Security measures  |z United States. 
650 0 |a Nuclear weapons  |z United States. 
650 7 |a POLITICAL SCIENCE / Security (National & International).  |2 bisacsh 
653 |a Cyber-nuclear connection. 
653 |a and communications. 
653 |a complexity-security tradeoff. 
653 |a control. 
653 |a conventional-nuclear integration. 
653 |a cyber risk. 
653 |a inadvertent escalation. 
653 |a nuclear command. 
653 |a nuclear delivery systems. 
653 |a nuclear weapons. 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2021 English  |z 9783110754001 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2021  |z 9783110753776  |o ZDB-23-DGG 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Political Science 2021 English  |z 9783110754179 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Political Science 2021  |z 9783110753943  |o ZDB-23-PLW 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t Stanford University Press Complete eBook-Package 2021  |z 9783110739145 
856 4 0 |u https://doi.uam.elogim.com/10.1515/9781503630406  |z Texto completo 
856 4 0 |u https://degruyter.uam.elogim.com/isbn/9781503630406  |z Texto completo 
912 |a 978-3-11-073914-5 Stanford University Press Complete eBook-Package 2021  |b 2021 
912 |a 978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English  |b 2021 
912 |a 978-3-11-075417-9 EBOOK PACKAGE Political Science 2021 English  |b 2021 
912 |a GBV-deGruyter-alles 
912 |a ZDB-23-DGG  |b 2021 
912 |a ZDB-23-PLW  |b 2021