Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
1Activity

Table Of Contents

1. Introduction
2. Action: Threats and Challenges
Threats
Direct military threats
Indirect and non-military threats
Terrorism and extremism
Cyber espionage
Economic cyber crime
Psychological cyber warfare
Challenges
Hostile actions short of warfare
Categories of warfare
Cyber warfare as an extension of politics
Cyber intent
Cyber attribution
Summary
3. Reaction: Policy and Operations
Key actors
The United States
The United Kingdom
The challenges of confict in cyberspace
The state: overstretched and out of place?
Political engagement
Economic cyber warfare
Preparing a response
Agility and attribution
Consistency of language
The merits and limitations of existing frameworks
Reliance on privately owned infrastructure
Public-private partnerships and critical national
Allies and international agreements
Cyber warfare: a strategic problem
The ‘ends’ of cyber warfare
The ‘ways’ of cyber warfare
The ‘means’ of cyber warfare
Policy: a strategic framework and a strategic solution
5. Conclusion
0 of .
Results for:
No results containing your search query
P. 1
Chatham House Report - cyberwarfare (2)

Chatham House Report - cyberwarfare (2)

Ratings: (0)|Views: 39 |Likes:
Published by shane.morgan5948

More info:

Published by: shane.morgan5948 on Feb 20, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/16/2011

pdf

text

original

You're Reading a Free Preview
Pages 5 to 49 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->