Cyber strategy : the evolving character of power and coercion / Brandon Valeriano, Benjamin Jensen, and Ryan C. Maness.
By: Valeriano, Brandon [author.].
Contributor(s): Jensen, Benjamin M [author.] | Maness, Ryan C [author.].
Publisher: New York, NY : Oxford University Press, ©2018Description: xii, 305 pages ; 25 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9780190618094; 0190618094.Subject(s): Cyberterrorism | Information warfare -- Case studies | Cyberspace operations (Military science)Genre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | HV6773.15.C97 V35 2018 (Browse shelf) | Available | AU00000000019852 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
HV6773.15.C97 G85 2017 Inside the enemy's computer : identifying cyber-attackers / | HV6773.15.C97 M53 2017 A history of cyber security attacks : 1980 to present / | HV6773.15.C97 S36 2019 The perfect weapon : war, sabotage, and fear in the cyber age / | HV6773.15.C97 V35 2018 Cyber strategy : the evolving character of power and coercion / | HV6773.15 .P45 2022 Phishing and communication channels : a guide to identifying and mitigating phishing attacks / | HV6773.15.P45 V56 2022 The weakest link : how to diagnose, detect, and defend users from phishing / | HV6773.2 .C585 2019 The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats / |
Includes bibliographical references (pages 257-290) and index.
How rival states employ cyber strategy : disruption, espionage, and degradation -- The correlates of cyber strategy -- Cyber coercion as a combined strategy -- Commissars and crooks : Russian cyber coercion -- China and the technology gap : Chinese strategic behavior in cyberspace -- The United States : the cyber reconnaissance-strike complex.
"In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. Despite the alarmist discussion surrounding the threat of cyber attack, the authors of this book (in a vein similar to Thomas Rid) argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. What Valeriano and Maness provide in this manuscript is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--