Cargando…

Crisis and escalation in cyberspace /

"The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Libicki, Martin C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica, CA : RAND, [2012]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn818866398
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 121119s2012 cau ob 000 0 eng
010 |a  2012046778 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCF  |d WSU  |d OCLCO  |d OCLCL 
019 |a 870962829  |a 889303188  |a 961658313  |a 1008953545  |a 1055355245  |a 1058069864  |a 1081246135  |a 1115102694  |a 1228593269 
020 |a 9780833076809  |q (epub) 
020 |a 0833076809 
020 |a 9780833076816  |q (prc) 
020 |a 0833076817 
020 |a 9780833076793  |q ( ebook/pdf) 
020 |a 0833076795 
020 |z 9780833076786 (pbk. : alk. paper) 
029 1 |a AU@  |b 000050186484 
029 1 |a AU@  |b 000053309560 
029 1 |a DEBBG  |b BV043036689 
029 1 |a DEBBG  |b BV044062972 
029 1 |a DEBSZ  |b 421231343 
029 1 |a GBVCP  |b 1008657905 
029 1 |a NZ1  |b 15590520 
035 |a (OCoLC)818866398  |z (OCoLC)870962829  |z (OCoLC)889303188  |z (OCoLC)961658313  |z (OCoLC)1008953545  |z (OCoLC)1055355245  |z (OCoLC)1058069864  |z (OCoLC)1081246135  |z (OCoLC)1115102694  |z (OCoLC)1228593269 
042 |a pcc 
043 |a n-us--- 
050 0 0 |a U163 
082 0 0 |a 358.4/141  |2 23 
049 |a UAMI 
100 1 |a Libicki, Martin C. 
245 1 0 |a Crisis and escalation in cyberspace /  |c Martin C. Libicki. 
264 1 |a Santa Monica, CA :  |b RAND,  |c [2012] 
300 |a 1 online resource 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
504 |a Includes bibliographical references. 
505 0 |a Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses. 
588 |a Description based on print version record and CIP data provided by publisher. 
520 |a "The chances are growing that the United States will find itself in a crisis in cyberspace, with the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. The genesis for this work was the broader issue of how the Air Force should integrate kinetic and nonkinetic operations. Central to this process was careful consideration of how escalation options and risks should be treated, which, in turn, demanded a broader consideration across the entire crisis-management spectrum. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises."--Page 4 of cover. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a JSTOR  |b Books at JSTOR Open Access 
610 1 0 |a United States.  |b Air Force  |x Organization. 
610 1 0 |a United States.  |b Air Force  |x Decision making. 
610 1 6 |a États-Unis.  |b Air Force  |x Organisation. 
610 1 6 |a États-Unis.  |b Air Force  |x Prise de décision. 
610 1 7 |a United States.  |b Air Force  |2 fast 
650 0 |a Information warfare  |z United States. 
650 0 |a Escalation (Military science) 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Crisis management  |x Government policy  |z United States. 
650 0 |a Cyberterrorism  |x Prevention. 
650 0 |a Conflict management. 
650 6 |a Guerre de l'information  |z États-Unis. 
650 6 |a Escalade (Science militaire) 
650 6 |a Gestion de crise  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Gestion des conflits. 
650 7 |a Armed Forces  |x Organization  |2 fast 
650 7 |a Conflict management  |2 fast 
650 7 |a Cyberspace  |x Security measures  |2 fast 
650 7 |a Cyberterrorism  |x Prevention  |2 fast 
650 7 |a Escalation (Military science)  |2 fast 
650 7 |a Information warfare  |2 fast 
651 7 |a United States  |2 fast 
758 |i has work:  |a Crisis and escalation in cyberspace (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH3KpybqCXWHFYYd4RxrWP  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Libicki, Martin C.  |t Crisis and escalation in cyberspace  |d Santa Monica, CA : RAND, [2012]  |z 9780833076786  |w (DLC) 2012046227 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1365190  |z Texto completo 
938 |a Books 24x7  |b B247  |n bkg00062868 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1365190 
938 |a EBSCOhost  |b EBSC  |n 674641 
938 |a YBP Library Services  |b YANK  |n 11090604 
938 |a YBP Library Services  |b YANK  |n 11425108 
994 |a 92  |b IZTAP