Cybersecurity and cyberwar what everyone needs to know

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Singer, P. W. 1974- (VerfasserIn), Friedman, Allan (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Oxford Oxford University Press [2014]
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV041556929
003 DE-604
005 20180413
007 t|
008 140114s2014 xx |||| 00||| eng d
020 |a 9780199918096  |c (hardback)  |9 978-0-19-991809-6 
020 |a 9780199918119  |c (paperback)  |9 978-0-19-991811-9 
035 |a (OCoLC)869872128 
035 |a (DE-599)OBVAC11227338 
040 |a DE-604  |b ger 
041 0 |a eng 
049 |a DE-N2  |a DE-20  |a DE-11  |a DE-473  |a DE-188  |a DE-739  |a DE-706  |a DE-19  |a DE-91  |a DE-210 
050 0 |a QA76.9 
082 0 |a 005.8 
084 |a MF 9500  |0 (DE-625)122811:  |2 rvk 
084 |a QP 345  |0 (DE-625)141866:  |2 rvk 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
084 |a POL 285f  |2 stub 
084 |a SOZ 611f  |2 stub 
100 1 |a Singer, P. W.  |d 1974-  |e Verfasser  |0 (DE-588)131662260  |4 aut 
245 1 0 |a Cybersecurity and cyberwar  |b what everyone needs to know  |c P. W. Singer and Allan Friedman 
264 1 |a Oxford  |b Oxford University Press  |c [2014] 
264 4 |c © 2014 
300 |a viii, 306 Seiten  |c 22 cm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
500 |a Enthält Notizen mit Literaturangaben Seite: 259-291 und Index 
650 0 7 |a Information warfare  |0 (DE-588)4461975-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
651 7 |a USA  |0 (DE-588)4078704-7  |2 gnd  |9 rswk-swf 
689 0 0 |a USA  |0 (DE-588)4078704-7  |D g 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
689 1 0 |a USA  |0 (DE-588)4078704-7  |D g 
689 1 1 |a Information warfare  |0 (DE-588)4461975-3  |D s 
689 1 |5 DE-604 
700 1 |a Friedman, Allan  |e Verfasser  |0 (DE-588)1048209539  |4 aut 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe, PDF  |z 978-0-19-991810-2  |w (DE-604)BV043629752 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe, EPUB  |z 978-0-19-936457-2 
856 4 2 |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027002531&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027002531 

Datensatz im Suchindex

DE-BY-TUM_call_number 0002 SOZ 611f 2018 A 2495
DE-BY-TUM_katkey 2318266
DE-BY-TUM_location 00
DE-BY-TUM_media_number 040008633190
_version_ 1820804670325522432
adam_text CONTENTS INTRODUCTION 1 Why Write a Book about Cybersecurity and Су bemar? 1 Why Is There a Cybersecurity Knowledge Gap, and Why Does It Matter? 4 How Did You Write the Book and What Do You Hope to Accomplish? 8 PART I HOW IT ALL WORKS 12 The World Wide What? Defining Cyberspace 12 Where Did This Cyber Stuff Come from Anyway? A Short History of the Internet How Does the Internet Actually Work? 21 Who Runs It? Understanding Internet Governance 26 On the Internet, How Do They Know Whether You Are a Dog? Identity and Authentication 31 What Do We Mean by Security Anyway? 34 What Are the Threats? 36 One Phish, Two Phish, Red Phish, Cyber Phish: What Are Vulnerabilities? 39 How Do We Trust in Cyberspace ? 45 Focus: What Happened in WikiLeaks? 51 vi Contents What Is an Advanced Persistent Threat (APT)? 55 How Do We Keep the Bad Guys Out? The Bastes of Computer Defense 60 Who Is the Weakest Link? Human Factors & PART II WHY IT MATTERS 67 What Is the Meaning of Cyberattack? The Importance of Terms and Frameworks Whodunit? The Problem of Attribution 72 What Is Hactivism? 77 Focus: Who Is Anonymous? °® The Crimes of Tomorrow, Today: What Is Cybercrime? 85 Shady RATs and Cyberspies: What Is Cyber Espionage ? d1 How Afraid Should We Be of Cyberterrorism ? ^ So How Do Terrorists Actually Use the Web ? What about Cyber Counterterrorism ? 1 °3 Security Risk or Human Right? Foreign Policy and the Internet 106 Focus: What Is Tor and Why Does Peeling Back the Onion Matter? 108 Who Are Patriotic Hackers ? HO Focus: What Was Stuxnet? 1 M What Is the Hidden Lesson ofStuxnet? The Ethics of Cyberweapons 118 Cyberwar, Ugh, What Are Zeros and Ones Good For? : Defining Cyberwar 120 A War by Any Other Name? The Legal Side of Cyber Conflict 122 What Might a Cyberwar Actually Look Like? Computer Network Operations 126 Focus: What Is the US Military Approach to Cyberwar? 133 Focus: What Is the Chinese Approach to Cyberwar? 138 What about Deterrence in an Era of Cyberwar? 144 Why Is Threat Assessment So Hard in Cyberspace? 148 Does the Cybersecurity World Favor the Weak or the Strong? 150 Who Has the Advantage, the Offense or the Defense? 153 Contents vii A New Kind of Arms Race: What Are the Dangers of Cyber Proliferation ? 156 Are There Lessons from Past Arms Races? 160 Behind the Scenes: Is There a Cyber-lndustrial Complex? 162 PART III WHAT CAN WE DO? 166 Don t Get Fooled: Why Can t We Just Build a New, More Secure Internet? 166 Rethink Security: What Is Resilience, and Why Is It important? 169 Reframe the Problem (and the Solution): What Can We Learn from Public Health? 173 Learn from History: What Can (Real) Pirates Teach Us about Cybersecurity? 177 Protect World Wide Governance for the World Wide Web: What Is the Role of International Institutions? 180 Graft the Rule of Law: Do We Need a Cyberspace Treaty? 185 Understand the Limits of the State in Cyberspace: Why Can t the Government Handle It? 193 Rethink Government s Role: How Can We Better Organize for Cybersecurity? 197 Approach It as a Public-Private Problem: How Do We Better Coordinate Defense? 205 Exercise Is Good for You: How Can We Better Prepare for Cyber Incidents? 211 Build Cybersecurity Incentives: Why Should 1 Do What You Want? 216 Learn to Share: How Can We Better Collaborate on Information ? 222 Demand Disclosure: What Is the Role of Transparency? 228 Get Vigorous about Responsibility: How Can We Create Accountability for Security? 231 Find the IT Crowd: How Do We Solve the Cyber People Problem? 235 Do Your Part: How Can I Protect Myself (and the Internet)? 241 viii Contents CONCLUSIONS 247 Where Is Cybersecurity Headed Next? 247 What Do I Really Need to Know in the End? 255 ACKNOWLEDGMENTS 257 NOTES 259 GLOSSARY 293 INDEX 301
any_adam_object 1
author Singer, P. W. 1974-
Friedman, Allan
author_GND (DE-588)131662260
(DE-588)1048209539
author_facet Singer, P. W. 1974-
Friedman, Allan
author_role aut
aut
author_sort Singer, P. W. 1974-
author_variant p w s pw pws
a f af
building Verbundindex
bvnumber BV041556929
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9
callnumber-search QA76.9
callnumber-sort QA 276.9
callnumber-subject QA - Mathematics
classification_rvk MF 9500
QP 345
ST 277
classification_tum POL 285f
SOZ 611f
ctrlnum (OCoLC)869872128
(DE-599)OBVAC11227338
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
Politologie
Soziologie
Wirtschaftswissenschaften
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02221nam a2200529zc 4500</leader><controlfield tag="001">BV041556929</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180413 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">140114s2014 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199918096</subfield><subfield code="c">(hardback)</subfield><subfield code="9">978-0-19-991809-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199918119</subfield><subfield code="c">(paperback)</subfield><subfield code="9">978-0-19-991811-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)869872128</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)OBVAC11227338</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-N2</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-210</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MF 9500</subfield><subfield code="0">(DE-625)122811:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">POL 285f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SOZ 611f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singer, P. W.</subfield><subfield code="d">1974-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)131662260</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and cyberwar</subfield><subfield code="b">what everyone needs to know</subfield><subfield code="c">P. W. Singer and Allan Friedman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">viii, 306 Seiten</subfield><subfield code="c">22 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Enthält Notizen mit Literaturangaben Seite: 259-291 und Index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Friedman, Allan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1048209539</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-0-19-991810-2</subfield><subfield code="w">(DE-604)BV043629752</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-0-19-936457-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=027002531&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027002531</subfield></datafield></record></collection>
geographic USA (DE-588)4078704-7 gnd
geographic_facet USA
id DE-604.BV041556929
illustrated Not Illustrated
indexdate 2024-12-24T03:59:17Z
institution BVB
isbn 9780199918096
9780199918119
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027002531
oclc_num 869872128
open_access_boolean
owner DE-N2
DE-20
DE-11
DE-473
DE-BY-UBG
DE-188
DE-739
DE-706
DE-19
DE-BY-UBM
DE-91
DE-BY-TUM
DE-210
owner_facet DE-N2
DE-20
DE-11
DE-473
DE-BY-UBG
DE-188
DE-739
DE-706
DE-19
DE-BY-UBM
DE-91
DE-BY-TUM
DE-210
physical viii, 306 Seiten 22 cm
publishDate 2014
publishDateSearch 2014
publishDateSort 2014
publisher Oxford University Press
record_format marc
spellingShingle Singer, P. W. 1974-
Friedman, Allan
Cybersecurity and cyberwar what everyone needs to know
Information warfare (DE-588)4461975-3 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4461975-3
(DE-588)4274324-2
(DE-588)4078704-7
title Cybersecurity and cyberwar what everyone needs to know
title_auth Cybersecurity and cyberwar what everyone needs to know
title_exact_search Cybersecurity and cyberwar what everyone needs to know
title_full Cybersecurity and cyberwar what everyone needs to know P. W. Singer and Allan Friedman
title_fullStr Cybersecurity and cyberwar what everyone needs to know P. W. Singer and Allan Friedman
title_full_unstemmed Cybersecurity and cyberwar what everyone needs to know P. W. Singer and Allan Friedman
title_short Cybersecurity and cyberwar
title_sort cybersecurity and cyberwar what everyone needs to know
title_sub what everyone needs to know
topic Information warfare (DE-588)4461975-3 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Information warfare
Computersicherheit
USA
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027002531&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT singerpw cybersecurityandcyberwarwhateveryoneneedstoknow
AT friedmanallan cybersecurityandcyberwarwhateveryoneneedstoknow