Russian Cyber Operations : Coding the Boundaries of Conflict /
Russia has deployed cyber operations to interfere in foreignelections, launch disinformation campaigns, and cripple neighboringstates-all while maintaining a thin veneer of deniability andavoiding strikes that cross the line into acts of war. How should atargeted nation respond? In Russian Cyber Ope...
Autor principal: | |
---|---|
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Washington, DC :
Georgetown University Press,
2022.
|
Colección: | Book collections on Project MUSE.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Foreword by Gen. Keith Alexander, USA (Ret.)
- Acknowledgments
- List of Abbreviations
- Introductio
- Chapter 1. Analytical Framework
- PART I. Cyber Operation
- Chapter 2. Asymmetric Arsenal Tool
- Chapter 3. Hybrid Warfare Element
- Chapter 4. Information Warfare Component
- PART II. Security Dynamics
- Chapter 5. Rational State Behavior
- Chapter 6. Unconvincing Responses
- PART III. Defensive Solutions
- Chapter 7. Current Security Measures
- Chapter 8. Automated Cyber Defense
- Chapter 9. Technical Offset Strategy
- Conclusion
- Index
- About the Author.