Cargando…

PERSPECTIVES ON CYBERSECURITY.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: JAKUB DRMOLA
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : MASARYKOVA UNIVERZITA.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Intro
  • Foreword
  • Table of Contents
  • Summary
  • Cyberscepticism: Arguments Against Cyberwar
  • Introduction
  • Aims and Methodology
  • Existing Concepts, Clashing Attitudes
  • The First Concepts of Cyberwar
  • The Alarmists and the Sceptics: Where Does the Truth Lie?
  • A Rejected Notion
  • An Improbable Cyberwar: The Sceptical Standpoint
  • Conclusion
  • Cyberdeterrence
  • Introduction
  • Cyber and Deterrence "Theory"
  • Cyberspace Theory
  • Theory of Deterrence
  • Cyberdeterrence
  • Possibilities for Using Cyberdeterrence
  • Concept of Cyberdeterrence
  • Can Cyberdeterrence be Effective?
  • Conclusion
  • Principle of Distinction in Cyber Warfare
  • Introduction
  • Law and Its Purpose
  • Applying Distinction to Cyberspace
  • The system as a legitimate military objective and excessive damage
  • An IT expert as a direct participant in hostilities
  • Conclusion
  • The Phenomenon of Advanced Persistent Threat: Identification of Criteria in New Cases
  • Introduction
  • Previous Research
  • APT
  • Why APT?
  • Criteria
  • Resources
  • Targets
  • Intentions
  • Skills and Experience
  • Persistence
  • Behaviour pattern
  • APT Not State-sponsored?
  • Anatomy of Attack
  • Preparation
  • Initial Intrusion
  • Expansion
  • Exfiltration
  • Previous Cases
  • New Cases
  • Red October
  • Careto
  • Gauss
  • Icefog
  • Turla
  • Kimsuky
  • Summary
  • Conclusion
  • Chinese Telecommunications Companies as a Threat to Critical Infrastructure: The Case of Huawei
  • Introduction
  • Huawei's History and Profile
  • Assessment of Huawei as a Threat
  • Character of Possible Risks Toward Critical Infrastructure Definition
  • Huawei's Current Status
  • Huawei's Strategy
  • Conclusion
  • Regional Cyber Security Cooperation Regimes: Opportunities and Challenges
  • Introduction
  • Importance of Regionalism for Cybersecurity
  • Security dilemma: The dynamics in cyberspace
  • Security Dilemma: The Strategic ambiguity
  • Interpretation of capabilities
  • Response
  • On norms
  • The conditions for the emergence of norms
  • Benefits and Challenges of Regionalism for Reducing the Security Dilemma
  • Obstacles to cooperation
  • Major Concerns for Normative Regional Cooperation
  • Cybersecurity Measures in Regional Organizations
  • The Shanghai Cooperation Organization
  • The Asia-Pacific Economic Cooperation
  • The Association of Southeast Asian Nations