PERSPECTIVES ON CYBERSECURITY.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
MASARYKOVA UNIVERZITA.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Intro
- Foreword
- Table of Contents
- Summary
- Cyberscepticism: Arguments Against Cyberwar
- Introduction
- Aims and Methodology
- Existing Concepts, Clashing Attitudes
- The First Concepts of Cyberwar
- The Alarmists and the Sceptics: Where Does the Truth Lie?
- A Rejected Notion
- An Improbable Cyberwar: The Sceptical Standpoint
- Conclusion
- Cyberdeterrence
- Introduction
- Cyber and Deterrence "Theory"
- Cyberspace Theory
- Theory of Deterrence
- Cyberdeterrence
- Possibilities for Using Cyberdeterrence
- Concept of Cyberdeterrence
- Can Cyberdeterrence be Effective?
- Conclusion
- Principle of Distinction in Cyber Warfare
- Introduction
- Law and Its Purpose
- Applying Distinction to Cyberspace
- The system as a legitimate military objective and excessive damage
- An IT expert as a direct participant in hostilities
- Conclusion
- The Phenomenon of Advanced Persistent Threat: Identification of Criteria in New Cases
- Introduction
- Previous Research
- APT
- Why APT?
- Criteria
- Resources
- Targets
- Intentions
- Skills and Experience
- Persistence
- Behaviour pattern
- APT Not State-sponsored?
- Anatomy of Attack
- Preparation
- Initial Intrusion
- Expansion
- Exfiltration
- Previous Cases
- New Cases
- Red October
- Careto
- Gauss
- Icefog
- Turla
- Kimsuky
- Summary
- Conclusion
- Chinese Telecommunications Companies as a Threat to Critical Infrastructure: The Case of Huawei
- Introduction
- Huawei's History and Profile
- Assessment of Huawei as a Threat
- Character of Possible Risks Toward Critical Infrastructure Definition
- Huawei's Current Status
- Huawei's Strategy
- Conclusion
- Regional Cyber Security Cooperation Regimes: Opportunities and Challenges
- Introduction
- Importance of Regionalism for Cybersecurity
- Security dilemma: The dynamics in cyberspace
- Security Dilemma: The Strategic ambiguity
- Interpretation of capabilities
- Response
- On norms
- The conditions for the emergence of norms
- Benefits and Challenges of Regionalism for Reducing the Security Dilemma
- Obstacles to cooperation
- Major Concerns for Normative Regional Cooperation
- Cybersecurity Measures in Regional Organizations
- The Shanghai Cooperation Organization
- The Asia-Pacific Economic Cooperation
- The Association of Southeast Asian Nations