Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Contents
Title page
Copyright page
Figures, Tables and Storyboxes
Figures
Tables
Storyboxes
Acknowledgments
Abbreviations
Introduction
Our approach
Notes
1 The expanding scope of cybersecurity
A brief history of the computer
An open network of networks
The spread of the Internet
The rise of cyber threats
A global security issue
Discussion questions
Further resources
Notes
2 What is cyberspace?
Defining cyberspace
Physical-network layer
Logical-network layer
Persona layer
Understanding cyberspace: The technical value
Discussion questions
Further resources
Notes
3 Governing cyberspace
Technical governance of cyberspace
The political, social and economic governance of cyberspace
The laws and norms of cyberspace
Internet governance is a complicated mess
Discussion questions
Further resources
Notes
4 Cyber capabilities and insecurity
The arsenal of possibilities
Developing offensive cyber capabilities
Criminal cyber-capability development
State cyber-capability development
The effects and characteristics of cyber capabilities
Cyber capabilities: A weapon?
Discussion questions
Further resources
Notes
5 National cybersecurity and strategy
Cyber power, national security and strategy
China: controlling information
Russia’s holistic approach
The United States: A pro-active cyber power
Common lenses and challenges
Discussion questions
Further reading
Notes
6 Cyber war
War in the fifth domain
Cyber war is coming!
Will cyber war take place?
From cyber war to cyber conflict
Cyberspace and military operations
Conclusion
Discussion questions
Further resources
Notes
7 Non-state threats: From cybercrime to terrorism
Criminals
Hacktivists
Cyberterrorists
The non-state actor(s)
Discussion questions
Further reading
Notes
8 Organizing deterrence and defense in cyberspace
Technical cyber defense and deterrence by denial
Defense through deterrence by punishment
Conclusion: The painful reality
Discussion questions
Further resources
Notes
9 Cybersecurity and democracy
Democracy and security in cyberspace
A liberation technology
Whose cybersecurity?
Encryption and cyber (in)security
Conclusion
Discussion questions
Further reading
Notes
10 The futures of cybersecurity
Toward an ever more interconnected world: The Internet of Things
Big data and artificial intelligence
Human–machine interactions
Conclusion: Adapting to the evolving cybersecurity environment
Notes
Bibliography
Index
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →