Author: MacDonnell Ulsch
Publisher: John Wiley & Sons
ISBN: 1118935950
Category : Business & Economics
Languages : en
Pages : 224
Book Description
Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.
Cyber Threat!
Author: MacDonnell Ulsch
Publisher: John Wiley & Sons
ISBN: 1118935950
Category : Business & Economics
Languages : en
Pages : 224
Book Description
Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.
Publisher: John Wiley & Sons
ISBN: 1118935950
Category : Business & Economics
Languages : en
Pages : 224
Book Description
Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information. Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include: The information at risk The true extent of the threat The potential consequences across sectors The multifaceted approach to defense The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.
Data Science in Cybersecurity and Cyberthreat Intelligence
Author: Leslie F. Sikos
Publisher: Springer Nature
ISBN: 3030387887
Category : Computers
Languages : en
Pages : 140
Book Description
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
Publisher: Springer Nature
ISBN: 3030387887
Category : Computers
Languages : en
Pages : 140
Book Description
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
Cyber Threat Intelligence
Author: Ali Dehghantanha
Publisher: Springer
ISBN: 3319739514
Category : Computers
Languages : en
Pages : 334
Book Description
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions – this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.
Publisher: Springer
ISBN: 3319739514
Category : Computers
Languages : en
Pages : 334
Book Description
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions – this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.
Collaborative Cyber Threat Intelligence
Author: Florian Skopik
Publisher: CRC Press
ISBN: 1315397897
Category : Computers
Languages : en
Pages : 447
Book Description
Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to single organizations only. This book provides a unique angle on the topic of national cyber threat intelligence and security information sharing. It also provides a clear view on ongoing works in research laboratories world-wide in order to address current security concerns at national level. It allows practitioners to learn about upcoming trends, researchers to share current results, and decision makers to prepare for future developments.
Publisher: CRC Press
ISBN: 1315397897
Category : Computers
Languages : en
Pages : 447
Book Description
Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to single organizations only. This book provides a unique angle on the topic of national cyber threat intelligence and security information sharing. It also provides a clear view on ongoing works in research laboratories world-wide in order to address current security concerns at national level. It allows practitioners to learn about upcoming trends, researchers to share current results, and decision makers to prepare for future developments.
Digital Resilience
Author: Ray Rothrock
Publisher: AMACOM
ISBN: 081443925X
Category : Computers
Languages : en
Pages : 272
Book Description
In the Digital Age of the twenty-first century, the question is not if you will be targeted, but when. Are you prepared? If not, where does one begin? For an enterprise to be fully prepared for the immanent attack, it must be actively monitoring networks, taking proactive steps to understand and contain attacks, enabling continued operation during an incident, and have a full recovery plan already in place. Cybersecurity expert Ray Rothrock has provided for businesses large and small a must-have resource that highlights: the tactics used by today’s hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving while under assault. Businesses and individuals will understand better the threats they face, be able to identify and address weaknesses, and respond to exploits swiftly and effectively. From data theft to downed servers, from malware to human error, cyber events can be triggered anytime from anywhere around the globe. Digital Resilience provides the resilience-building strategies your business needs to prevail--no matter what strikes.
Publisher: AMACOM
ISBN: 081443925X
Category : Computers
Languages : en
Pages : 272
Book Description
In the Digital Age of the twenty-first century, the question is not if you will be targeted, but when. Are you prepared? If not, where does one begin? For an enterprise to be fully prepared for the immanent attack, it must be actively monitoring networks, taking proactive steps to understand and contain attacks, enabling continued operation during an incident, and have a full recovery plan already in place. Cybersecurity expert Ray Rothrock has provided for businesses large and small a must-have resource that highlights: the tactics used by today’s hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving while under assault. Businesses and individuals will understand better the threats they face, be able to identify and address weaknesses, and respond to exploits swiftly and effectively. From data theft to downed servers, from malware to human error, cyber events can be triggered anytime from anywhere around the globe. Digital Resilience provides the resilience-building strategies your business needs to prevail--no matter what strikes.
The Cyber Threat
Author: Bob Gourley
Publisher: Createspace Independent Pub
ISBN: 9781501065149
Category : True Crime
Languages : en
Pages : 94
Book Description
What do business leaders need to know about the cyber threat to their operations? Author Bob Gourley, the Director of Intelligence in the first Department of Defense cyber defense organization and lead for cyber intelligence at Cognitio Corp shares lessons from direct contact with adversaries in cyberspace in a new book titled “The Cyber Threat” (newly updated for 2015) Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. Reading this book will teach you things your adversaries wish you did not know and in doing so will enhance your ability to defend against cyber attack. The book explores the threat and the role of the emerging discipline of Cyber Intelligence as a way of making threat information actionable in support of your business objectives. "When I'm researching my own books, I always turn to Bob Gourley. I make diasasters up. He's seen them for real. And most important, he knows how to stop them. Read this. It'll scare you, but also protect you." · Brad Meltzer, #1 bestselling author of The Inner Circle "The insights Bob provides in The Cyber Threat are an essential first step in developing your cyber defense solution." · Keith Alexander, General, USA (Ret), Former Director, NSA, and Commander, US Cyber Command "There are no excuses anymore. Trying to run a business without awareness of the cyber threat is asking to be fired. The Cyber Threat succinctly articulates insights you need to know right now." · Scott McNealy, Co-founder and Former CEO, Sun Microsystems and Chairman Wayin. "Vaguely uneasy about your cyber security but stumped about what to do? Easy. READ THIS BOOK! "The Cyber Threat" will open your mind to a new domain and how you can make yourself safer in it." · Michael Hayden, General, USAF (Ret), Former Director, NSA and Director, CIA "Bob Gourley was one of the first intelligence specialists to understand the complex threats and frightening scope, and importance of the cyber threat. His book can give you the edge in what has emerged as one of the most compelling, mind-bending and fast moving issues of our time." · Bill Studeman, Admiral, USN (Ret), Former Director, NSA and Deputy Director, CIA "The Cyber Threat captures insights into dynamic adversaries that businesses and governments everywhere should be working to defeat. Knowing the threat and one's own defenses are the first steps in winning this battle." · Mike McConnell, Admiral, USN (Ret), Former Director of National Intelligence and Director, NSA Written by a career intelligence professional and enterprise CTO, this book was made for enterprise professionals including technology and business executives who know they must mitigate a growing threat.
Publisher: Createspace Independent Pub
ISBN: 9781501065149
Category : True Crime
Languages : en
Pages : 94
Book Description
What do business leaders need to know about the cyber threat to their operations? Author Bob Gourley, the Director of Intelligence in the first Department of Defense cyber defense organization and lead for cyber intelligence at Cognitio Corp shares lessons from direct contact with adversaries in cyberspace in a new book titled “The Cyber Threat” (newly updated for 2015) Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. Reading this book will teach you things your adversaries wish you did not know and in doing so will enhance your ability to defend against cyber attack. The book explores the threat and the role of the emerging discipline of Cyber Intelligence as a way of making threat information actionable in support of your business objectives. "When I'm researching my own books, I always turn to Bob Gourley. I make diasasters up. He's seen them for real. And most important, he knows how to stop them. Read this. It'll scare you, but also protect you." · Brad Meltzer, #1 bestselling author of The Inner Circle "The insights Bob provides in The Cyber Threat are an essential first step in developing your cyber defense solution." · Keith Alexander, General, USA (Ret), Former Director, NSA, and Commander, US Cyber Command "There are no excuses anymore. Trying to run a business without awareness of the cyber threat is asking to be fired. The Cyber Threat succinctly articulates insights you need to know right now." · Scott McNealy, Co-founder and Former CEO, Sun Microsystems and Chairman Wayin. "Vaguely uneasy about your cyber security but stumped about what to do? Easy. READ THIS BOOK! "The Cyber Threat" will open your mind to a new domain and how you can make yourself safer in it." · Michael Hayden, General, USAF (Ret), Former Director, NSA and Director, CIA "Bob Gourley was one of the first intelligence specialists to understand the complex threats and frightening scope, and importance of the cyber threat. His book can give you the edge in what has emerged as one of the most compelling, mind-bending and fast moving issues of our time." · Bill Studeman, Admiral, USN (Ret), Former Director, NSA and Deputy Director, CIA "The Cyber Threat captures insights into dynamic adversaries that businesses and governments everywhere should be working to defeat. Knowing the threat and one's own defenses are the first steps in winning this battle." · Mike McConnell, Admiral, USN (Ret), Former Director of National Intelligence and Director, NSA Written by a career intelligence professional and enterprise CTO, this book was made for enterprise professionals including technology and business executives who know they must mitigate a growing threat.
Cyberbullying and Cyberthreats
Author: Nancy E. Willard
Publisher: Research Press
ISBN: 9780878225378
Category : Computers
Languages : en
Pages : 322
Book Description
Online communications can be extremely cruel and vicious. They can cause great emotional harm and can take place 24/7. Damaging text and images can be widely disseminated and impossible to fully remove. There are increasing reports of youth suicide, violence, and abduction related to cyberbullying and cyberthreats. This essential resource provides school counselors, administrators, and teachers with cutting-edge information on how to prevent and respond to cyberbullying and cyberthreats. It addresses real-life situations that often occur as students embrace the Internet and other digital technologies: Sending offensive or harassing messages Dissing someone or spreading nasty rumors on sites such as MySpace Disclosing someone's intimate personal information Breaking into someone's e-mail account and sending damaging messages under that person's name Excluding someone from an online group Using the Internet to intimidate The book includes detailed guidelines for managing in-school use of the Internet and personal digital devices, including cell phones. Extensive reproducible appendices contain forms for assessment, planning, and intervention, as well as a 9-page student guide and 16-page parent guide. An accompanying CD of all the reproducible forms and student handouts is included with the book.
Publisher: Research Press
ISBN: 9780878225378
Category : Computers
Languages : en
Pages : 322
Book Description
Online communications can be extremely cruel and vicious. They can cause great emotional harm and can take place 24/7. Damaging text and images can be widely disseminated and impossible to fully remove. There are increasing reports of youth suicide, violence, and abduction related to cyberbullying and cyberthreats. This essential resource provides school counselors, administrators, and teachers with cutting-edge information on how to prevent and respond to cyberbullying and cyberthreats. It addresses real-life situations that often occur as students embrace the Internet and other digital technologies: Sending offensive or harassing messages Dissing someone or spreading nasty rumors on sites such as MySpace Disclosing someone's intimate personal information Breaking into someone's e-mail account and sending damaging messages under that person's name Excluding someone from an online group Using the Internet to intimidate The book includes detailed guidelines for managing in-school use of the Internet and personal digital devices, including cell phones. Extensive reproducible appendices contain forms for assessment, planning, and intervention, as well as a 9-page student guide and 16-page parent guide. An accompanying CD of all the reproducible forms and student handouts is included with the book.
Dawn of the Code War
Author: John P. Carlin
Publisher: PublicAffairs
ISBN: 1541773810
Category : Computers
Languages : en
Pages : 477
Book Description
The inside story of how America's enemies launched a cyber war against us-and how we've learned to fight back With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The "Code War" is upon us. In this dramatic book, former Assistant Attorney General John P. Carlin takes readers to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies. Today, as our entire economy goes digital, from banking to manufacturing to transportation, the potential targets for our enemies multiply. This firsthand account is both a remarkable untold story and a warning of dangers yet to come.
Publisher: PublicAffairs
ISBN: 1541773810
Category : Computers
Languages : en
Pages : 477
Book Description
The inside story of how America's enemies launched a cyber war against us-and how we've learned to fight back With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The "Code War" is upon us. In this dramatic book, former Assistant Attorney General John P. Carlin takes readers to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies. Today, as our entire economy goes digital, from banking to manufacturing to transportation, the potential targets for our enemies multiply. This firsthand account is both a remarkable untold story and a warning of dangers yet to come.
The Cyber Threat and Globalization
Author: Jack A. Jarmon
Publisher: Rowman & Littlefield
ISBN: 1538104326
Category : Political Science
Languages : en
Pages : 281
Book Description
In the post-industrial age, information is more valuable than territory and has become the main commodity influencing geopolitics today. The reliance of societies on cyberspace and information and communication technologies (ICTs) for economic prosperity and national security represents a new domain of human activity and conflict. Their potential as tools of social disruption and the low cost of entry of asymmetric conflict have forced a paradigm shift. The Cyber Threat and Globalization is designed for students of security studies and international relations, as well as security professionals who want a better grasp of the nature and existential threat of today’s information wars. It explains policies and concepts, as well as describes the threats posed to the U.S. by disgruntled employees, hacktivists, criminals, terrorists, and hostile governments. Features Special textboxes provide vignettes and case studies to illustrate key concepts. Opinion pieces, essays, and extended quotes from noted subject matter experts underscore the main ideas. Written to be accessible to students and the general public, concepts are clear, engaging, and highly practical.
Publisher: Rowman & Littlefield
ISBN: 1538104326
Category : Political Science
Languages : en
Pages : 281
Book Description
In the post-industrial age, information is more valuable than territory and has become the main commodity influencing geopolitics today. The reliance of societies on cyberspace and information and communication technologies (ICTs) for economic prosperity and national security represents a new domain of human activity and conflict. Their potential as tools of social disruption and the low cost of entry of asymmetric conflict have forced a paradigm shift. The Cyber Threat and Globalization is designed for students of security studies and international relations, as well as security professionals who want a better grasp of the nature and existential threat of today’s information wars. It explains policies and concepts, as well as describes the threats posed to the U.S. by disgruntled employees, hacktivists, criminals, terrorists, and hostile governments. Features Special textboxes provide vignettes and case studies to illustrate key concepts. Opinion pieces, essays, and extended quotes from noted subject matter experts underscore the main ideas. Written to be accessible to students and the general public, concepts are clear, engaging, and highly practical.
Cyberthreats and the Decline of the Nation-State
Author: Susan W. Brenner
Publisher: Routledge
ISBN: 113444382X
Category : Computers
Languages : en
Pages : 182
Book Description
This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.
Publisher: Routledge
ISBN: 113444382X
Category : Computers
Languages : en
Pages : 182
Book Description
This book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies.