Cargando…

Russian cyber operations : coding the boundaries of conflict /

"Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Jasper, Scott (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Washington, DC : Georgetown University Press, [2020]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_on1119747163
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |||||||||||
008 190829s2020 dcuab ob 001 0 eng
010 |a  2019038781 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCO  |d OCLCF  |d OCLCQ  |d YDX  |d P@U  |d EBLCP  |d YDX  |d N$T  |d JSTOR  |d COO  |d OCLCO  |d OCLCQ 
019 |a 1165398055 
020 |a 1626167990  |q electronic book 
020 |a 9781626167995  |q (electronic bk.) 
020 |z 9781626167971  |q hardcover 
020 |z 9781626167988  |q paperback 
020 |a 1626167974 
020 |a 9781626167971 
020 |a 1626167982 
020 |a 9781626167988 
029 1 |a AU@  |b 000066558390 
035 |a (OCoLC)1119747163  |z (OCoLC)1165398055 
037 |a 22573/ctv116f8gc  |b JSTOR 
042 |a pcc 
043 |a e-ru---  |a n-us--- 
050 0 4 |a U167.5.C92  |b J375 2020 
072 7 |a POL  |x 012000  |2 bisacsh 
072 7 |a POL  |x 060000  |2 bisacsh 
082 0 0 |a 355.4/1  |2 23 
049 |a UAMI 
100 1 |a Jasper, Scott,  |e author. 
245 1 0 |a Russian cyber operations :  |b coding the boundaries of conflict /  |c Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.). 
264 1 |a Washington, DC :  |b Georgetown University Press,  |c [2020] 
300 |a 1 online resource (xvi, 214 pages) :  |b illustrations, maps 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion. 
520 |a "Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"--  |c Provided by publisher. 
588 |a Description based on online resource; title from digital title page (viewed on May 19, 2020). 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Cyberspace operations (Military science)  |z Russia (Federation) 
650 0 |a Information warfare  |z Russia (Federation) 
650 0 |a Hybrid warfare  |z Russia (Federation) 
650 0 |a Asymmetric warfare  |z Russia (Federation) 
650 0 |a Cyber intelligence (Computer security)  |z United States. 
650 0 |a Computer security  |z United States. 
650 6 |a Cyberguerre (Science militaire)  |z Russie. 
650 6 |a Guerre de l'information  |z Russie. 
650 6 |a Guerre hybride  |z Russie. 
650 6 |a Guerre asymétrique  |z Russie. 
650 6 |a Surveillance des menaces informatiques  |z États-Unis. 
650 6 |a Sécurité informatique  |z États-Unis. 
650 7 |a POLITICAL SCIENCE / Security (National & International)  |2 bisacsh 
650 7 |a Asymmetric warfare.  |2 fast  |0 (OCoLC)fst00819862 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cyber intelligence (Computer security)  |2 fast  |0 (OCoLC)fst01893401 
650 7 |a Cyberspace operations (Military science)  |2 fast  |0 (OCoLC)fst01909446 
650 7 |a Hybrid warfare.  |2 fast  |0 (OCoLC)fst01940519 
650 7 |a Information warfare.  |2 fast  |0 (OCoLC)fst00973186 
651 7 |a Russia (Federation)  |2 fast  |0 (OCoLC)fst01262050 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
776 0 8 |i Print version:  |a Jasper, Scott.  |t Russian cyber operations  |d Washington, DC : Georgetown University Press, 2020.  |z 9781626167971  |w (DLC) 2019038780 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctv1169bjk  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6192048 
938 |a Project MUSE  |b MUSE  |n muse86123 
938 |a YBP Library Services  |b YANK  |n 16761012 
938 |a EBSCOhost  |b EBSC  |n 2469428 
994 |a 92  |b IZTAP