Cyberdeterrence and Cyberwar

by
Format: Paperback
Pub. Date: 2009-11-16
Publisher(s): RAND Corporation
List Price: $35.66

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. Some attackers tamper with networks to make money; others, to steal information; yet others, to be able to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might seem obvious that war in yberspace is like war in other media, but nothing would be more misleading. Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and most attack methods lose their usefulness quickly with repeated use. Cyberwar is nothing so much as the manipulation of ambiguity. The author explores these topics in detail and uses the results to address such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions the United States, and the U.S. Air Force, can take to protect itself in the face of deliberate cyberattack. Book jacket.

Table of Contents

Prefacep. iii
Figuresp. ix
Tablesp. xi
Summaryp. xiii
Acknowledgementsp. xxi
Abbreviationsp. xxiii
Introductionp. 1
Purposep. 5
Basic Concepts and Monograph Organizationp. 6
Chapter 2p. 11
The Mechanisms of Cyberspacep. 12
External Threatsp. 13
Internal Threatsp. 20
Insidersp. 20
Supply Chainp. 21
In Sump. 22
Defining Cyberattackp. 23
Defining Cyberdeterrencep. 27
Why Cyberdeterrence Is Differentp. 39
Do We Know Who Did It?p. 41
Can We Hold Their Assets at Risk?p. 52
Can We Do So Repeatedly?p. 56
If Retaliation Does Not Deter, Can It at Least Disarm?p. 59
Will Third Parties Join the Fight?p. 62
Does Retaliation Send the Right Message to Our Own Side?p. 64
Do We Have a Threshold for Response?p. 65
Can We Avoid Escalation?p. 69
What If the Attacker Has Little Worth Hitting?p. 70
Yet the Will to Retaliate Is More Credible for Cyberspacep. 71
A Good Defense Adds Further Credibilityp. 73
Why the Purpose of the Original Cyberattack Mattersp. 75
Errorp. 76
Oopsp. 76
No, You Started Itp. 77
Rogue Operatorsp. 78
The Command-and-Control Problemp. 78
Coercionp. 79
Forcep. 82
Otherp. 86
Implicationsp. 90
A Strategy of Responsep. 91
Should the Target Reveal the Cyberattack?p. 92
When Should Attribution Be Announced?p. 93
Should Cyberretaliation Be Obvious?p. 94
Is Retaliation Better Late Than Never?p. 96
Retaliating Against State-Tolerated Freelance Hackersp. 98
What About Retaliating Against CNE?p. 102
Should Deterrence Be Extended to Friends?p. 104
Should a Deterrence Policy Be Explicit?p. 106
Can Insouciance Defeat the Attackers Strategy?p. 108
Confrontation Without Retaliationp. 109
The Attackers Perspectivep. 112
Signaling to a Closep. 114
Strategic Cyberwarp. 117
The Purpose of Cyberwarp. 118
The Plausibility of Cyberwarp. 121
The Limits of Cyberwarp. 122
The Conduct of Cyberwarp. 125
Cyberwar as a Warning Against Cyberwarp. 126
Preserving a Second-Strike Capabilityp. 127
Sub-Rosa Cyberwar?p. 128
A Government Role in Defending Against Cyberwarp. 129
Managing the Effects of Cyberwarp. 131
Terminating Cyberwarp. 135
Conclusionsp. 137
Operational Cyberwarp. 139
Cyberwar as a Bolt from the Bluep. 143
Dampening the Ardor for Network-Centric Operationsp. 149
Attacks on Civilian Targetsp. 153
Organizing for Operational Cyberwarp. 154
Conclusionsp. 158
Chapter 8p. 159
The Goal of Cyberdefensep. 160
Architecturep. 165
Policyp. 167
Strategyp. 169
Operationsp. 170
Hardwarep. 171
Deceptionp. 171
Red Teamingp. 173
Conclusionsp. 173
Tricky Terrainp. 175
Appendixesp. 179
What Constitutes an Act of War in Cyberspace?p. 179
The Calculus of Explicit Versus Implicit Deterrencep. 183
The Dim Prospects for Cyber Arms Controlp. 199
Referencesp. 203
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.