Contemporary World Issues: Cyber Warfare: A Reference Handbook

Editor/Author Springer, Paul J.
Publication Year: 2015
Publisher: ABC-CLIO

ISBN: 978-1-61-069444-5
Category: Social Sciences - Criminology & Law
Image Count: 7
Book Status: Pending
Predicted Release Month:
Table of Contents

This essential reference os the only of its kind to include an overview of other cyber warfare literature, and emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure

Share this

Table of Contents

  • Preface
  • 1 Background and History
  • Information as a Tool of War
  • The Role of Communications in Modern Warfare
  • Early Attempts at Encryption
  • Direct Observation Techniques
  • The Creation of Cyberspace
  • The Cyber Attacks Begin
  • Cyber Enabling in the Nuclear Middle East
  • Preparations for Infrastructure Cyber Attacks
  • Russian Hacktivists and National Pride
  • The Chinese Approach to Irregular Warfare
  • The Current State of Cyber War
  • References
  • 2 Problems, Controversies, and Solutions
  • Is a Cyber War Possible?
  • Cyber as a Military Domain
  • Cyber Strategy
  • Instruments of National Power
  • Cyber Crime, Cyber Espionage, Cyberterrorism
  • The Problem of Attribution
  • People and Paranoia
  • Cyber Ethics
  • References
  • 3 Perspectives
  • Escalation in Cyberspace: Martin Libicki
  • Training Tomorrow's Cyber Warriors: Nicholas Michael Sambaluk
  • Cyber Warfare in the Professional Military Education System: S. Michael Pavelec
  • Waging e-Jihad: Heidi L. Dexter
  • The Relationship between Space and Cyber Assets: Brian Tannehill
  • References
  • 4 Profiles
  • About the Profiles Section
  • Alexander, Keith B.
  • Alperovitch, Dmitri
  • Anonymous
  • Carpenter, Shawn
  • Carr, Jeffrey
  • Clarke, Richard Alan
  • Defense Advanced Research Projects Agency (DARPA)
  • Defense Information Systems Agency (U.S.)
  • FireEye, Inc.
  • Google, Inc.
  • Hayden, Michael
  • Kaspersky, Yevgeniy “Eugene” Valentinovich
  • Libicki, Martin
  • Mandiant
  • McAfee, Inc.
  • Microsoft Corporation
  • Mitnick, Kevin
  • National Security Agency
  • NATO Cooperative Cyber Defence Centre of Excellence
  • People's Liberation Army Unit 61398 (China)
  • Qiao Liang and Wang Xiangsui
  • RAND Corporation
  • Rogers, Michael S.
  • Russian Business Network (RBN)
  • Snowden, Edward
  • Symantec Corporation
  • Syrian Electronic Army
  • Tenenbaum, Ehud “Udi,”
  • U.S. Cyber Command
  • WikiLeaks
  • References
  • 5 Documents
  • About the Documents Section
  • Excerpts from the North Atlantic Treaty (1949)
  • Remarks of President Barack Obama on Securing the Nation's Cyber Infrastructure, Washington, D.C., May 29, 2009
  • Excerpts of Secretary of State Hillary Clinton on Internet Freedom, Washington, D.C., January 21, 2010
  • Excerpts from the Tallinn Manual on the International Law Applicable to Cyber Warfare, Draft, NATO Cooperative Cyber Defence Centre of Excellence, 2010
  • Excerpts of “International Strategy for Cyberspace,” May 2011
  • Excerpts of Secretary of Defense Leon Panetta on Cybersecurity, October 11, 2012
  • Excerpts from U.S. Department of Defense, Defense Science Board, Task Force Report: “Resilient Military Systems and the Advanced Cyber Threat,” January 2013
  • Statement of General Keith B. Alexander, Commander, United States Cyber Command, before the Senate Committee on Armed Services, March 12, 2013
  • 6 Resources
  • Print Resources
  • Nonprint Resources
  • 7 Chronology
  • Glossary
  • About the Author