000 02480cam a2200433 a 4500
001 15828913
003 OSt
005 20240312064108.0
008 090722s2009 caua b 000 0 eng
010 _a 2009030055
020 _a9780833047342 (pbk. : alk. paper)
035 _a(OCoLC)ocn428819545
040 _aDLC
_cDLC
_dYDX
_dCZL
_dMUM
_dSOI
_dOCLNG
_dDLC
043 _an-us---
050 0 0 _aU163
_b.L539 2009
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aPOL
_x037000
_2bisacsh
072 7 _aTEC
_x025000
_2bisacsh
082 0 0 _a355.3/43
_222
100 1 _aLibicki, Martin C.
245 1 0 _aCyberdeterrence and cyberwar /
_cMartin C. Libicki.
260 _aSanta Monica, CA :
_bRAND,
_c2009.
300 _axxiv, 214 p. :
_bill. ;
_c23 cm.
500 _a"Prepared for the United States Air Force."
500 _a"Rand Project Air Force."
504 _aIncludes bibliographical references.
505 0 _aIntroduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control.
520 _aCyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
650 0 _aInformation warfare
_zUnited States.
650 0 _aCyberterrorism
_zUnited States
_xPrevention.
650 0 _aCyberspace
_xSecurity measures.
650 0 _aCyberspace operations (Military science)
_zUnited States.
650 0 _aComputer networks
_xSecurity measures
_zUnited States.
650 0 _aCivil defense
_zUnited States.
710 2 _aProject Air Force (U.S.)
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBK
_n0
999 _c14852
_d14852