Summer Reading Sale
 
 

Recently Viewed clear list


Original Essays | July 22, 2014

Nick Harkaway: IMG The Florist-Assassins



The three men lit up in my mind's eye, with footnotes. They were converging on me — and on the object I was carrying — in a way that had... Continue »
  1. $18.87 Sale Hardcover add to wish list

    Tigerman

    Nick Harkaway 9780385352413

spacer
Qualifying orders ship free.
$16.95
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
Qty Store Section
25 Local Warehouse Politics- United States Foreign Policy
25 Remote Warehouse Internet- General

This title in other editions

Cybersecurity and Cyberwar (What Everyone Needs to Know)

by

Cybersecurity and Cyberwar (What Everyone Needs to Know) Cover

 

Synopses & Reviews

Publisher Comments:

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood.

In Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon.

What Everyone Needs to Know® is a registered trademark of Oxford University Press.

Synopsis:

Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict.

In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.

About the Author

P.W. Singer is Director of the Center for 21st Century Security and Intelligence at the Brookings Institution.

Allan Friedman is Research Director of the Center for Technology Innovation at the Brookings Institution.

Table of Contents

1. Why cyberspace is wonderful ... and complicated

§ What is cyberspace?

§ Why do people talk about the difference of a networked world?

§ How does the Internet actually work?

§ Who owns this thing?

§ WaitEL You mean no one runs the internet?

§ What can governments do online? What are the limits of state power?

§ Just how dependent are we on cyberspace?

2. Security and Insecurity Online

§ What do we mean by a "secure" system?

§ What is the difference between an attack on a network and an attack on a system?

§ How does anti-virus software work?

§ How do you defend a network?

§ Why is anonymity a problem online? Why is it relatively easy to act without accountability?

§ How can you authenticate some one to be sure they are who they say they are?

§ How do we keep data secure in cyberspace?

3. Threats and Bad Actors

o Differentiating threats

o Value at risk

§ What are the bad guys after? What can you really do with a computer?

§ What's the worst you can do? Can a hacker really turn off the power grid?

o Different motivations of attackers

o Different types of attacks

o What is Cyber Terrorism, actually?

§ What does "cyberwarfare" mean?

§ How are countries militarizing cyberspace? Why?

§ So if we just built better systems, could we have a secure internet?

4. Case Studies / Examples of attacks

o Aurora / Google {phishing, attribution}

o Stuxnet {Critical infrastructure, intelligence}

o Wikileaks data breach and fallout {data protection, DoS}

o Israel-Syria Air Defense {Cyber-Kinetic Crossover, cyberwar}

5. Why securing cyberspace is hard

§ What are some mechanisms that enable us to trust systems or data?

§ What is the difference between espionage and exploitation?

§ Why not just write better software?

§ Why can't network operators detect bad behavior?

§ Why security through obscurity doesn't work

§ How do we know what has happened after a cyber incident?

§ How does the rise in "cloud computing" change the dynamics of cyber security?

§ What makes mobile computing different?

§ If everyone's systems are vulnerable, can't defenders just interrupt the attacker's systems?

§ Why is it so hard to know who the attackers are?

§ Why does attribution matter?

§ How do we measure a cyber risk?

§ Why aren't users able to protect themselves?

§ Don't vendors and service providers have enough incentives to provide good security?

§ Why aren't companies investing enough to protect themselves?

6. International Dimensions

§ What changes when cyber problems cross international borders?

§ How do countries differ in their approach to cyberspace?

§ Who has the biggest cyber armies?

§ What constitutes an act of war?

§ How does law enforcement deal with international boundaries?

§ What are existing international organizations currently doing?

§ What international treaties are in place?

§ Why don't the classic models of military deterrence work for cyberspace?

§ What are the obstacles to international cooperation to resolve cybersecurity issues?

7.The path forward to a more secure cyberspace

§ It sounds like every aspect of modern life is vulnerable. Are things really that bad?

§ Why can't we just re-built the technology to prevent bad behavior?

§ Can we impose accountability through national control of cyberspace?

§ How can private firms be incentivized to internalize their risk?

§ If a company or government agency was willing to invest in cyber security defenses, what would stand in their way?

§ Can internet service providers do more to identity and stop bad behavior?

§ How can we make it harder for bad actors to profit from successful attacks

§ What can I do to protect myself?

Product Details

ISBN:
9780199918119
Author:
Singer, P. W.
Publisher:
Oxford University Press (UK)
Author:
Singer, Peter W.
Author:
Friedman, Allan
Subject:
International Security
Subject:
Politics | International Studies | International Security & Strategic Studies
Subject:
Politics-United States Foreign Policy
Publication Date:
20140131
Binding:
TRADE PAPER
Language:
English
Pages:
320
Dimensions:
5.5 x 8.2 x 0.9 in 0.7 lb

Other books you might like

  1. Network Security a Beginner's Guide... New Trade Paper $40.00
  2. Cyber Warfare: Techniques, Tactics... New Trade Paper $39.95
  3. Social Engineering: The Art of Human... New Compact Disc $14.99
  4. Black Code: Surveillance, Privacy,... New Trade Paper $17.95
  5. Ghost in the Wires: My Adventures as... Used Trade Paper $10.95

Related Subjects

Computers and Internet » Networking » Computer Security
History and Social Science » Economics » General
History and Social Science » Politics » General
History and Social Science » Politics » United States » Foreign Policy

Cybersecurity and Cyberwar (What Everyone Needs to Know) New Trade Paper
0 stars - 0 reviews
$16.95 In Stock
Product details 320 pages Oxford University Press (UK) - English 9780199918119 Reviews:
"Synopsis" by , Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict.

In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.