NDU-K Library Catalogue

Girl in a jacket 
Image from Google Jackets

Cyberdeterrence and cyberwar / Martin C. Libicki.

By: Contributor(s): Material type: TextTextPublication details: Santa Monica, CA : RAND, 2009.Description: xxiv, 214 p. : ill. ; 23 cmISBN:
  • 9780833047342 (pbk. : alk. paper)
Subject(s): DDC classification:
  • 355.3/43 22
LOC classification:
  • U163 .L539 2009
Contents:
Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control.
Summary: Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

"Prepared for the United States Air Force."

"Rand Project Air Force."

Includes bibliographical references.

Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control.

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.

There are no comments on this title.

to post a comment.
Copyright © 2023 [National Defence University - Kenya]. All rights reserved.