Cargando…

Cybersecurity and cyberwar : what everyone needs to know /

A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Singer, P. W. (Peter Warren) (Autor)
Otros Autores: Friedman, Allan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford : Oxford University Press, [2014]
Colección:What everyone needs to know.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn864907720
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 131210t20142014nyua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d E7B  |d YDXCP  |d CCO  |d N$T  |d OCLCO  |d OCLCQ  |d IDEBK  |d EBLCP  |d MHW  |d MEAUC  |d AUD  |d DEBSZ  |d MOR  |d Z5A  |d MERUC  |d OCLCQ  |d SAV  |d OCLCA  |d ZEM  |d OCLCA  |d BAL  |d UUM  |d YDX  |d CEF  |d OCLCQ  |d INT  |d STF  |d OCLCQ  |d WYU  |d TKN  |d AGLDB  |d OCL  |d G3B  |d IGB  |d AUW  |d BTN  |d INTCL  |d SNK  |d DKC  |d OCLCQ  |d NJT  |d OCLCQ  |d TFW  |d OCLCO  |d IAC  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ 
015 |a GBB301524  |2 bnb 
016 7 |a 016246323  |2 Uk 
019 |a 862372354  |a 863595909  |a 962805954  |a 965341952  |a 1014223855  |a 1030218295  |a 1031565497  |a 1031868422  |a 1035504986  |a 1104696857  |a 1105951029  |a 1124330462  |a 1259487985 
020 |a 9780199918102  |q (electronic bk.) 
020 |a 0199918104  |q (electronic bk.) 
020 |a 1306081998 
020 |a 9781306081993 
020 |z 9780199918096 
020 |z 0199918090 
020 |z 9780199918119 
020 |z 0199918112 
029 1 |a AU@  |b 000052757088 
029 1 |a AU@  |b 000062305834 
029 1 |a CHNEW  |b 000637843 
029 1 |a CHNEW  |b 000886602 
029 1 |a CHNEW  |b 001020538 
029 1 |a CHVBK  |b 529499282 
029 1 |a DEBBG  |b BV041633714 
029 1 |a DEBSZ  |b 405519087 
029 1 |a GBVCP  |b 772605513 
029 1 |a NZ1  |b 15499482 
029 1 |a NZ1  |b 15697412 
035 |a (OCoLC)864907720  |z (OCoLC)862372354  |z (OCoLC)863595909  |z (OCoLC)962805954  |z (OCoLC)965341952  |z (OCoLC)1014223855  |z (OCoLC)1030218295  |z (OCoLC)1031565497  |z (OCoLC)1031868422  |z (OCoLC)1035504986  |z (OCoLC)1104696857  |z (OCoLC)1105951029  |z (OCoLC)1124330462  |z (OCoLC)1259487985 
037 |a 539450  |b MIL 
043 |a n-us--- 
050 4 |a QA76.9.A25  |b S562 2014eb 
055 3 |a QA76.9 A25  |b S546 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
084 |a POL012000  |2 bisacsh 
049 |a UAMI 
100 1 |a Singer, P. W.  |q (Peter Warren),  |e author. 
245 1 0 |a Cybersecurity and cyberwar :  |b what everyone needs to know /  |c P.W. Singer and Allan Friedman. 
264 1 |a Oxford :  |b Oxford University Press,  |c [2014] 
264 4 |c ©2014 
300 |a 1 online resource (iii, 306 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a What everyone needs to know 
504 |a Includes bibliographical references and index. 
505 0 |a INTRODUCTION. Why write a book about cybersecurity and cyberwar? -- Why is there a cybersecurity knowledge gap, and why does it matter? -- How did you write the book and what do you hope to accomplish? -- PART I. HOW IT ALL WORKS. The world wide what? Defining cyberspace -- Where did this "cyber stuff" come from anyway? A short history of the internet -- How does the internet actually work? -- Who runs it? Understanding internet governance -- On the internet, how do they know whether you are a dog? Identity and authentication -- What do we mean by "security" anyway? -- What are the threats? -- One phish, two phish, red phish, cyber phish: what are vulnerabilities? -- How do we trust in cyberspace? -- Focus: What happened in WikiLeaks? -- What is an advanced persistent threat (APT)? -- How do we keep the bad guys out? The basics of computer defense -- Who is the weakest link? Human factors -- PART II. WHY IT MATTERS. What is the meaning of cyberattack? The importance of terms and frameworks -- Whodunit? The problem of attribution -- What Is hactivism? -- Focus: Who is Anonymous? -- The crimes of tomorrow, today: what is cybercrime? -- Shady RATs and cyberspies: what is cyber espionage? -- How afraid should we be of cyberterrorism? -- So how do terrorists actually use the web? -- What about cyber counterterrorism? -- Security risk or human right? Foreign policy and the internet -- Focus: What is Tor and why does peeling back the onion matter? -- Who are patriotic hackers? -- Focus: What was Stuxnet? -- What is the hidden lesson of Stuxnet? The ethics of cyberweapons -- "Cyberwar, ugh, what are zeros and ones good for?": defining cyberwar -- A war by any other name? The legal side of cyber conflict -- What might a "cyberwar" actually look like? Computer network operations -- Focus: What is the US military approach to cyberwar? -- Focus: What is the Chinese approach to cyberwar? -- What about deterrence in an era of cyberwar? -- Why is threat assessment so hard in cyberspace? -- Does the cybersecurity world favor the weak or the strong? -- Who has the advantage, the offense or the defense? -- A new kind of arms race: what are the dangers of cyber proliferation? -- Are there lessons from past arms races? -- Behind the scenes: is there a cyber-industrial complex? -- PART III. WHAT CAN WE DO? Don't get fooled: why can't we just build a new, more secure internet? -- Rethink security: what is resilience, and why is it important? -- Reframe the problem (and the solution): what can we learn from public health? -- Learn from history: what can (real) pirates teach us about cybersecurity? -- Protect world wide governance for the world wide web: what Is the role of international institutions? -- "Graft" the rule of law: do we need a cyberspace treaty? -- Understand the limits of the state in cyberspace: why can't the government handle it? -- Rethink government's role: how can we better organize for cybersecurity? -- Approach it as a public-private problem: how do we better coordinate defense? -- Exercise is good for you: how can we better prepare for cyber incidents? -- Build cybersecurity incentives: why should I do what you want? -- Learn to share: how can we better collaborate on information? -- Demand disclosure: what is the role of transparency? -- Get "vigorous" about responsibility: how can we create accountability for security? -- Find the IT crowd: how do we solve the cyber people problem? -- Do your part: how can I protect myself (and the internet)? -- CONCLUSIONS. Where is cybersecurity headed next? -- What do I really need to know in the end? -- Acknowledgments -- Notes -- Glossary -- Index. 
520 |a A generation ago, ""cyberspace"" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money of. 
588 0 |a Print version record; online resource viewed February 9, 2021. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security  |z United States. 
650 0 |a Computer networks  |x Security measures  |z United States. 
650 0 |a Cyberspace  |x Security measures  |z United States. 
650 0 |a Cyberterrorism  |z United States  |x Prevention. 
650 0 |a Information warfare  |z United States  |x Prevention. 
650 0 |a Cyberspace operations (Military science) 
650 6 |a Sécurité informatique  |z États-Unis. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |z États-Unis. 
650 6 |a Cyberguerre (Science militaire) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE  |x Political Freedom & Security  |x International Security.  |2 bisacsh 
650 7 |a Cyberspace  |x Security measures.  |2 fast  |0 (OCoLC)fst02031378 
650 7 |a Information warfare  |x Prevention.  |2 fast  |0 (OCoLC)fst00973188 
650 7 |a Cyberterrorism  |x Prevention.  |2 fast  |0 (OCoLC)fst01905567 
650 7 |a Cyberspace operations (Military science)  |2 fast  |0 (OCoLC)fst01909446 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
650 1 7 |a Beveiliging.  |2 gtt  |0 (NL-LeOCL)078451183 
650 1 7 |a Internet.  |2 gtt  |0 (NL-LeOCL)101068689 
650 7 |a United States of America.  |2 pplt 
650 7 |a Cyberspace.  |2 pplt 
650 7 |a National security.  |2 pplt 
650 7 |a Computer-related crime.  |2 pplt 
650 7 |a Cyberwarfare.  |2 pplt 
650 7 |a Information and communication technology.  |2 pplt 
650 7 |a IT-säkerhet.  |2 sao 
650 7 |a Datanät  |x säkerhetsaspekter.  |2 sao 
650 7 |a Cyberspace  |x säkerhetsaspekter.  |2 sao 
650 7 |a Cyberterrorism  |x prevention.  |2 sao 
650 7 |a Informationskrigföring.  |2 sao 
650 7 |a IW  |x computers  |x information technology  |x communications  |x security  |x terrorism  |z USA.  |2 sipri 
700 1 |a Friedman, Allan. 
776 0 8 |i Print version:  |a Singer, P.W. (Peter Warren).  |t Cybersecurity and cyberwar.  |d Oxford : Oxford University Press, [2014]  |z 9780199918096  |w (DLC) 2013028127  |w (OCoLC)802324804 
830 0 |a What everyone needs to know. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=657629  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1538365 
938 |a ebrary  |b EBRY  |n ebr10792438 
938 |a EBSCOhost  |b EBSC  |n 657629 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26541403 
938 |a Internet Archive  |b INAR  |n cybersecuritycyb0000sing 
938 |a YBP Library Services  |b YANK  |n 11319484 
938 |a YBP Library Services  |b YANK  |n 17012839 
994 |a 92  |b IZTAP