|
|
|
|
LEADER |
00000cam a22000004a 4500 |
001 |
musev2_75401 |
003 |
MdBmJHUP |
005 |
20230905051804.0 |
006 |
m o d |
007 |
cr||||||||nn|n |
008 |
230217t20222022dcu o 00 0 eng d |
020 |
|
|
|a 9781647123345
|
020 |
|
|
|z 9781626167971
|
020 |
|
|
|z 9781647122966
|
035 |
|
|
|a (OCoLC)1119747163
|
040 |
|
|
|a MdBmJHUP
|c MdBmJHUP
|
100 |
1 |
|
|a Jasper, Scott,
|e author.
|
245 |
1 |
0 |
|a Russian Cyber Operations :
|b Coding the Boundaries of Conflict /
|c Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.).
|
264 |
|
1 |
|a Washington, DC :
|b Georgetown University Press,
|c 2022.
|
264 |
|
3 |
|a Baltimore, Md. :
|b Project MUSE,
|c 2020
|
264 |
|
4 |
|c ©2022.
|
300 |
|
|
|a 1 online resource (248 pages):
|b maps
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Foreword by Gen. Keith Alexander, USA (Ret.) -- Acknowledgments -- List of Abbreviations -- Introductio -- Chapter 1. Analytical Framework -- PART I. Cyber Operation -- Chapter 2. Asymmetric Arsenal Tool -- Chapter 3. Hybrid Warfare Element -- Chapter 4. Information Warfare Component -- PART II. Security Dynamics -- Chapter 5. Rational State Behavior -- Chapter 6. Unconvincing Responses -- PART III. Defensive Solutions -- Chapter 7. Current Security Measures -- Chapter 8. Automated Cyber Defense -- Chapter 9. Technical Offset Strategy -- Conclusion -- Index -- About the Author.
|
520 |
|
|
|a Russia has deployed cyber operations to interfere in foreignelections, launch disinformation campaigns, and cripple neighboringstates-all while maintaining a thin veneer of deniability andavoiding strikes that cross the line into acts of war. How should atargeted nation respond? In Russian Cyber Operations,Scott Jasper dives into the legal and technical maneuvers ofRussian cyber strategies, proposing that nations develop solutionsfor resilience to withstand future attacks. Jasper examines the place of cyber operations within Russia'sasymmetric arsenal and its use of hybrid and information warfare,considering examples from French and US presidential elections andthe 2017 NotPetya mock ransomware attack, among others. A newpreface to the paperback edition puts events since 2020 intocontext. Jasper shows that the international effort to counterthese operations through sanctions and indictments has done littleto alter Moscow's behavior. Jasper instead proposes that nationsuse data correlation technologies in an integrated securityplatform to establish a more resilient defense. Russian Cyber Operations provides a critical frameworkfor determining whether Russian cyber campaigns and incidents riseto the level of armed conflict or operate at a lower level as acomponent of competition. Jasper's work offers the nationalsecurity community a robust plan of action critical to effectivelymounting a durable defense against Russian cyber campaigns.
|
588 |
|
|
|a Description based on print version record.
|
650 |
|
7 |
|a Diplomatic relations.
|2 fast
|0 (OCoLC)fst01907412
|
650 |
|
7 |
|a Cyberterrorism.
|2 fast
|0 (OCoLC)fst00885802
|
650 |
|
7 |
|a Computer crimes
|x Political aspects.
|2 fast
|0 (OCoLC)fst00872067
|
650 |
|
0 |
|a Computer crimes
|x Political aspects
|z Russia (Federation)
|
650 |
|
0 |
|a Cyberterrorism
|z Russia (Federation)
|
651 |
|
7 |
|a Russia (Federation)
|2 fast
|0 (OCoLC)fst01262050
|
651 |
|
0 |
|a Russia (Federation)
|x Foreign relations.
|
655 |
|
7 |
|a Electronic books.
|2 local
|
710 |
2 |
|
|a Project Muse.
|e distributor
|
830 |
|
0 |
|a Book collections on Project MUSE.
|
856 |
4 |
0 |
|z Texto completo
|u https://projectmuse.uam.elogim.com/book/75401/
|
945 |
|
|
|a Project MUSE - Custom Collection
|
945 |
|
|
|a Project MUSE - 2020 Complete
|
945 |
|
|
|a Project MUSE - 2020 Political Science and Policy Studies
|
945 |
|
|
|a Project MUSE - 2020 Russian and East European Studies
|