Cyberdeterrence and cyberwar

Cyberspace, where information-and hence serious value-is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but ther...

Full description

Saved in:
Bibliographic Details
Main Author: Libicki, Martin C. (Author)
Corporate Authors: United States. Air Force, Project Air Force (U.S.)
Format: Book
Language:English
Published: Santa Monica, CA RAND 2009
Series:MG (Rand Corporation)
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 48950
003 MY-KLNDU
005 20241219005600.0
008 130703 2009 caua b 000 0 eng d
020 |a 9780833047342 (pbk) 
039 9 |a 202302201331  |b hainim  |c 201403111124  |d zul  |c 201309241521  |d azraai  |y 201307031111  |z hasniza 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a U 163  |b .L539 2009 
090 |a U 163  |b .L539 2009 
100 1 |a Libicki, Martin C.  |e author 
245 1 0 |a Cyberdeterrence and cyberwar  |c Martin C. Libicki 
264 1 |a Santa Monica, CA  |b RAND  |c 2009 
264 4 |a © 2009 
300 |a xxiv, 214 pages  |b ilustrations  |c 23 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a Monograph (Rand Corporation) 
504 |a Includes bibliographical references 
505 |a Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control. 
520 |a Cyberspace, where information-and hence serious value-is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack. 
592 |a 0003  |b 9/9/13  |c RM128.75  |h Ridha 
650 0 |a Information warfare  |z United States 
650 0 |a Cyberterrorism  |z United States  |x Prevention 
650 0 |a Cyberspace  |x Security measures 
650 0 |a Computer networks  |x Security measures  |z United States 
650 0 |a Civil defense  |z United States 
710 1 |a United States.  |b Air Force 
710 2 |a Project Air Force (U.S.) 
830 0 |a MG (Rand Corporation) 
999 |a vtls000049666  |c 48950  |d 48950