Cybersecurity and cyberwar what everyone needs to know
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Oxford University Press
[2014]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV041556929 | ||
003 | DE-604 | ||
005 | 20180413 | ||
007 | t| | ||
008 | 140114s2014 xx |||| 00||| eng d | ||
020 | |a 9780199918096 |c (hardback) |9 978-0-19-991809-6 | ||
020 | |a 9780199918119 |c (paperback) |9 978-0-19-991811-9 | ||
035 | |a (OCoLC)869872128 | ||
035 | |a (DE-599)OBVAC11227338 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-N2 |a DE-20 |a DE-11 |a DE-473 |a DE-188 |a DE-739 |a DE-706 |a DE-19 |a DE-91 |a DE-210 | ||
050 | 0 | |a QA76.9 | |
082 | 0 | |a 005.8 | |
084 | |a MF 9500 |0 (DE-625)122811: |2 rvk | ||
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a POL 285f |2 stub | ||
084 | |a SOZ 611f |2 stub | ||
100 | 1 | |a Singer, P. W. |d 1974- |e Verfasser |0 (DE-588)131662260 |4 aut | |
245 | 1 | 0 | |a Cybersecurity and cyberwar |b what everyone needs to know |c P. W. Singer and Allan Friedman |
264 | 1 | |a Oxford |b Oxford University Press |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a viii, 306 Seiten |c 22 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Enthält Notizen mit Literaturangaben Seite: 259-291 und Index | ||
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Friedman, Allan |e Verfasser |0 (DE-588)1048209539 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 978-0-19-991810-2 |w (DE-604)BV043629752 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-0-19-936457-2 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027002531&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027002531 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0002 SOZ 611f 2018 A 2495 |
---|---|
DE-BY-TUM_katkey | 2318266 |
DE-BY-TUM_location | 00 |
DE-BY-TUM_media_number | 040008633190 |
_version_ | 1820804670325522432 |
adam_text | CONTENTS
INTRODUCTION
1
Why Write a Book about Cybersecurity and
Су
bemar?
1
Why Is There a Cybersecurity Knowledge Gap, and Why Does It Matter?
4
How Did You Write the Book and What Do You Hope
to Accomplish?
8
PART I HOW IT ALL WORKS
12
The World Wide What? Defining Cyberspace
12
Where Did This Cyber Stuff Come from Anyway? A Short History
of the Internet
How Does the Internet Actually Work?
21
Who Runs It? Understanding Internet Governance
26
On the Internet, How Do They Know Whether You Are a Dog?
Identity and Authentication
31
What Do We Mean by Security Anyway?
34
What Are the Threats?
36
One Phish, Two Phish, Red Phish, Cyber Phish: What Are
Vulnerabilities?
39
How Do We Trust in Cyberspace
?
45
Focus: What Happened in WikiLeaks? 51
vi
Contents
What Is an Advanced Persistent Threat (APT)? 55
How Do We Keep the Bad Guys Out? The Bastes of Computer Defense
60
Who Is the Weakest Link? Human Factors
&
PART II WHY IT MATTERS 67
What Is the Meaning of Cyberattack? The Importance of Terms
and Frameworks
Whodunit? The Problem of Attribution 72
What Is Hactivism? 77
Focus: Who Is Anonymous? °®
The Crimes of Tomorrow, Today: What Is Cybercrime? 85
Shady RATs and Cyberspies: What Is Cyber Espionage
?
d1
How Afraid Should We Be of Cyberterrorism
?
^
So How Do Terrorists Actually Use the Web
?
What about Cyber Counterterrorism
? 1
°3
Security Risk or Human Right? Foreign Policy and the Internet
106
Focus: What Is Tor and Why Does Peeling Back the Onion Matter?
108
Who Are Patriotic Hackers
?
HO
Focus: What Was Stuxnet?
1
M
What Is the Hidden Lesson ofStuxnet? The Ethics of Cyberweapons
118
Cyberwar, Ugh, What Are Zeros and Ones Good For? :
Defining Cyberwar
120
A War by Any Other Name? The Legal Side of Cyber Conflict
122
What Might a Cyberwar Actually Look Like? Computer Network
Operations
126
Focus: What Is the US Military Approach to Cyberwar?
133
Focus: What Is the Chinese Approach to Cyberwar?
138
What about Deterrence in an Era of Cyberwar?
144
Why Is Threat Assessment So Hard in Cyberspace?
148
Does the Cybersecurity World Favor the Weak or the Strong?
150
Who Has the Advantage, the Offense or the Defense?
153
Contents
vii
A New
Kind of Arms Race: What Are the Dangers of
Cyber Proliferation
? 156
Are There Lessons from Past Arms Races?
160
Behind the Scenes: Is There a Cyber-lndustrial Complex?
162
PART III WHAT CAN WE DO?
166
Don t Get Fooled: Why Can t We Just Build a New, More
Secure Internet?
166
Rethink Security: What Is Resilience, and Why Is It important?
169
Reframe the Problem (and the Solution): What Can We Learn
from Public Health?
173
Learn from History: What Can (Real) Pirates Teach Us about
Cybersecurity?
177
Protect World Wide Governance for the World Wide Web: What Is
the Role of International Institutions?
180
Graft the Rule of Law: Do We Need a Cyberspace Treaty?
185
Understand the Limits of the State in Cyberspace: Why Can t
the Government Handle It?
193
Rethink Government s Role: How Can We Better Organize for
Cybersecurity?
197
Approach It as a Public-Private Problem: How Do We Better
Coordinate Defense?
205
Exercise Is Good for You: How Can We Better Prepare for
Cyber Incidents?
211
Build Cybersecurity Incentives: Why Should
1
Do What You Want?
216
Learn to Share: How Can We Better Collaborate on Information
? 222
Demand Disclosure: What Is the Role of Transparency?
228
Get Vigorous about Responsibility: How Can We Create
Accountability for Security?
231
Find the IT Crowd: How Do We Solve the Cyber People Problem?
235
Do Your Part: How Can I Protect Myself (and the Internet)?
241
viii Contents
CONCLUSIONS
247
Where Is Cybersecurity Headed Next?
247
What Do I Really Need to Know in the End?
255
ACKNOWLEDGMENTS
257
NOTES
259
GLOSSARY
293
INDEX
301
|
any_adam_object | 1 |
author | Singer, P. W. 1974- Friedman, Allan |
author_GND | (DE-588)131662260 (DE-588)1048209539 |
author_facet | Singer, P. W. 1974- Friedman, Allan |
author_role | aut aut |
author_sort | Singer, P. W. 1974- |
author_variant | p w s pw pws a f af |
building | Verbundindex |
bvnumber | BV041556929 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9 |
callnumber-search | QA76.9 |
callnumber-sort | QA 276.9 |
callnumber-subject | QA - Mathematics |
classification_rvk | MF 9500 QP 345 ST 277 |
classification_tum | POL 285f SOZ 611f |
ctrlnum | (OCoLC)869872128 (DE-599)OBVAC11227338 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Politologie Soziologie Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02221nam a2200529zc 4500</leader><controlfield tag="001">BV041556929</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180413 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">140114s2014 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199918096</subfield><subfield code="c">(hardback)</subfield><subfield code="9">978-0-19-991809-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199918119</subfield><subfield code="c">(paperback)</subfield><subfield code="9">978-0-19-991811-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)869872128</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)OBVAC11227338</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-N2</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-210</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MF 9500</subfield><subfield code="0">(DE-625)122811:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">POL 285f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SOZ 611f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singer, P. W.</subfield><subfield code="d">1974-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)131662260</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and cyberwar</subfield><subfield code="b">what everyone needs to know</subfield><subfield code="c">P. W. Singer and Allan Friedman</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">viii, 306 Seiten</subfield><subfield code="c">22 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Enthält Notizen mit Literaturangaben Seite: 259-291 und Index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Friedman, Allan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1048209539</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-0-19-991810-2</subfield><subfield code="w">(DE-604)BV043629752</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-0-19-936457-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027002531&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027002531</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV041556929 |
illustrated | Not Illustrated |
indexdate | 2024-12-24T03:59:17Z |
institution | BVB |
isbn | 9780199918096 9780199918119 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027002531 |
oclc_num | 869872128 |
open_access_boolean | |
owner | DE-N2 DE-20 DE-11 DE-473 DE-BY-UBG DE-188 DE-739 DE-706 DE-19 DE-BY-UBM DE-91 DE-BY-TUM DE-210 |
owner_facet | DE-N2 DE-20 DE-11 DE-473 DE-BY-UBG DE-188 DE-739 DE-706 DE-19 DE-BY-UBM DE-91 DE-BY-TUM DE-210 |
physical | viii, 306 Seiten 22 cm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Oxford University Press |
record_format | marc |
spellingShingle | Singer, P. W. 1974- Friedman, Allan Cybersecurity and cyberwar what everyone needs to know Information warfare (DE-588)4461975-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4274324-2 (DE-588)4078704-7 |
title | Cybersecurity and cyberwar what everyone needs to know |
title_auth | Cybersecurity and cyberwar what everyone needs to know |
title_exact_search | Cybersecurity and cyberwar what everyone needs to know |
title_full | Cybersecurity and cyberwar what everyone needs to know P. W. Singer and Allan Friedman |
title_fullStr | Cybersecurity and cyberwar what everyone needs to know P. W. Singer and Allan Friedman |
title_full_unstemmed | Cybersecurity and cyberwar what everyone needs to know P. W. Singer and Allan Friedman |
title_short | Cybersecurity and cyberwar |
title_sort | cybersecurity and cyberwar what everyone needs to know |
title_sub | what everyone needs to know |
topic | Information warfare (DE-588)4461975-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Information warfare Computersicherheit USA |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027002531&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT singerpw cybersecurityandcyberwarwhateveryoneneedstoknow AT friedmanallan cybersecurityandcyberwarwhateveryoneneedstoknow |