Cyberdeterrence and cyberwar
Cyberspace, where information-and hence serious value-is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but ther...
Saved in:
| Main Author: | |
|---|---|
| Corporate Authors: | , |
| Format: | Book |
| Language: | English |
| Published: |
Santa Monica, CA
RAND
2009
|
| Series: | MG (Rand Corporation)
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 48950 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219005600.0 | ||
| 008 | 130703 2009 caua b 000 0 eng d | ||
| 020 | |a 9780833047342 (pbk) | ||
| 039 | 9 | |a 202302201331 |b hainim |c 201403111124 |d zul |c 201309241521 |d azraai |y 201307031111 |z hasniza | |
| 040 | |a MY-KlNDU |b eng |c MY-KlNDU |e rda | ||
| 050 | |a U 163 |b .L539 2009 | ||
| 090 | |a U 163 |b .L539 2009 | ||
| 100 | 1 | |a Libicki, Martin C. |e author | |
| 245 | 1 | 0 | |a Cyberdeterrence and cyberwar |c Martin C. Libicki |
| 264 | 1 | |a Santa Monica, CA |b RAND |c 2009 | |
| 264 | 4 | |a © 2009 | |
| 300 | |a xxiv, 214 pages |b ilustrations |c 23 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 490 | 1 | |a Monograph (Rand Corporation) | |
| 504 | |a Includes bibliographical references | ||
| 505 | |a Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control. | ||
| 520 | |a Cyberspace, where information-and hence serious value-is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack. | ||
| 592 | |a 0003 |b 9/9/13 |c RM128.75 |h Ridha | ||
| 650 | 0 | |a Information warfare |z United States | |
| 650 | 0 | |a Cyberterrorism |z United States |x Prevention | |
| 650 | 0 | |a Cyberspace |x Security measures | |
| 650 | 0 | |a Computer networks |x Security measures |z United States | |
| 650 | 0 | |a Civil defense |z United States | |
| 710 | 1 | |a United States. |b Air Force | |
| 710 | 2 | |a Project Air Force (U.S.) | |
| 830 | 0 | |a MG (Rand Corporation) | |
| 999 | |a vtls000049666 |c 48950 |d 48950 | ||


