Cyberdeterrence and Cyberwar
by Libicki, Martin C.Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
| Preface | p. iii |
| Figures | p. ix |
| Tables | p. xi |
| Summary | p. xiii |
| Acknowledgements | p. xxi |
| Abbreviations | p. xxiii |
| Introduction | p. 1 |
| Purpose | p. 5 |
| Basic Concepts and Monograph Organization | p. 6 |
| Chapter 2 | p. 11 |
| The Mechanisms of Cyberspace | p. 12 |
| External Threats | p. 13 |
| Internal Threats | p. 20 |
| Insiders | p. 20 |
| Supply Chain | p. 21 |
| In Sum | p. 22 |
| Defining Cyberattack | p. 23 |
| Defining Cyberdeterrence | p. 27 |
| Why Cyberdeterrence Is Different | p. 39 |
| Do We Know Who Did It? | p. 41 |
| Can We Hold Their Assets at Risk? | p. 52 |
| Can We Do So Repeatedly? | p. 56 |
| If Retaliation Does Not Deter, Can It at Least Disarm? | p. 59 |
| Will Third Parties Join the Fight? | p. 62 |
| Does Retaliation Send the Right Message to Our Own Side? | p. 64 |
| Do We Have a Threshold for Response? | p. 65 |
| Can We Avoid Escalation? | p. 69 |
| What If the Attacker Has Little Worth Hitting? | p. 70 |
| Yet the Will to Retaliate Is More Credible for Cyberspace | p. 71 |
| A Good Defense Adds Further Credibility | p. 73 |
| Why the Purpose of the Original Cyberattack Matters | p. 75 |
| Error | p. 76 |
| Oops | p. 76 |
| No, You Started It | p. 77 |
| Rogue Operators | p. 78 |
| The Command-and-Control Problem | p. 78 |
| Coercion | p. 79 |
| Force | p. 82 |
| Other | p. 86 |
| Implications | p. 90 |
| A Strategy of Response | p. 91 |
| Should the Target Reveal the Cyberattack? | p. 92 |
| When Should Attribution Be Announced? | p. 93 |
| Should Cyberretaliation Be Obvious? | p. 94 |
| Is Retaliation Better Late Than Never? | p. 96 |
| Retaliating Against State-Tolerated Freelance Hackers | p. 98 |
| What About Retaliating Against CNE? | p. 102 |
| Should Deterrence Be Extended to Friends? | p. 104 |
| Should a Deterrence Policy Be Explicit? | p. 106 |
| Can Insouciance Defeat the Attackers Strategy? | p. 108 |
| Confrontation Without Retaliation | p. 109 |
| The Attackers Perspective | p. 112 |
| Signaling to a Close | p. 114 |
| Strategic Cyberwar | p. 117 |
| The Purpose of Cyberwar | p. 118 |
| The Plausibility of Cyberwar | p. 121 |
| The Limits of Cyberwar | p. 122 |
| The Conduct of Cyberwar | p. 125 |
| Cyberwar as a Warning Against Cyberwar | p. 126 |
| Preserving a Second-Strike Capability | p. 127 |
| Sub-Rosa Cyberwar? | p. 128 |
| A Government Role in Defending Against Cyberwar | p. 129 |
| Managing the Effects of Cyberwar | p. 131 |
| Terminating Cyberwar | p. 135 |
| Conclusions | p. 137 |
| Operational Cyberwar | p. 139 |
| Cyberwar as a Bolt from the Blue | p. 143 |
| Dampening the Ardor for Network-Centric Operations | p. 149 |
| Attacks on Civilian Targets | p. 153 |
| Organizing for Operational Cyberwar | p. 154 |
| Conclusions | p. 158 |
| Chapter 8 | p. 159 |
| The Goal of Cyberdefense | p. 160 |
| Architecture | p. 165 |
| Policy | p. 167 |
| Strategy | p. 169 |
| Operations | p. 170 |
| Hardware | p. 171 |
| Deception | p. 171 |
| Red Teaming | p. 173 |
| Conclusions | p. 173 |
| Tricky Terrain | p. 175 |
| Appendixes | p. 179 |
| What Constitutes an Act of War in Cyberspace? | p. 179 |
| The Calculus of Explicit Versus Implicit Deterrence | p. 183 |
| The Dim Prospects for Cyber Arms Control | p. 199 |
| References | p. 203 |
| Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.