Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
8Activity

Table Of Contents

1. CYBER SECURITY AND NATIONAL SECURITY
The Nature and Scope of this Book
Research Outline
II. BIRTH OF A CONCEPT: STRATEGIC CYBER SECURITY
2. CYBER SECURITY: A SHORT HISTORY
The Power of Computers
The Rise of Malicious Code
Lone Hacker to Cyber Army
National Security Planning
More Questions than Answers
3. CYBER SECURITY: A TECHNICAL PRIMER
Cyber Security Analysis
Case Study: Saudi Arabia
Modeling Cyber Attack and Defense in a Laboratory
4. CYBER SECURITY: REAL-WORLD IMPACT
Cyber Security and Internal Political Security221
Case Study: Belarus239
International Confict in Cyberspace
III. NATION-STATE CYBER ATTACK MITIGATION STRATEGIES
5. NEXT GENERATION INTERNET: IS IPV6 THE ANSWER?287
IPv6 Address Space
Improved Security?
IPv6 Answers Some Questions, Creates Others
Privacy Concerns
Uneven Worldwide Deployment
Diferences of Opinion Remain
6. SUN TZU: CAN OUR BEST MILITARY DOCTRINE ENCOMPASS CYBER WAR?
What is Cyber Warfare?
What is Art of War?
Strategic Thinking
Cultivating Success
Objective Calculations
Time to Fight
The Ideal Commander
Art of Cyber War: Elements of a New Framework
7. DETERRENCE: CAN WE PREVENT CYBER ATTACKS?
Cyber Attacks and Deterrence Theory
Cyber Attack Deterrence by Denial
Cyber Attack Deterrence by Punishment
Mutually Assured Disruption (MAD)
8. ARMS CONTROL: CAN WE LIMIT CYBER WEAPONS?
Cyber Attack Mitigation by Political Means
The Chemical Weapons Convention
CWC: Lessons for Cyber Confict
Toward a Cyber Weapons Convention
The Challenges of Prohibition and Inspection
IV. DATA ANALYSIS AND RESEARCH RESULTS
9. DEMATEL AND STRATEGIC ANALYSIS
DEMATEL Infuencing Factors
National Security Threats
Key Cyber Attack Advantages
Cyber Attack Categories
Strategic Cyber Attack Targets
Cyber Attack Mitigation Strategies
10. KEY FINDINGS
The “Expert Knowledge” Matrix
Causal Loop Diagram
Calculating Indirect Infuence
Analyzing Total Infuence
V. CONCLUSION
11. RESEARCH CONTRIBUTIONS
Suggestions for Future Research
VI. BIBLIOGRAPHY
0 of .
Results for:
No results containing your search query
P. 1
Strategic Cyber Security K Geers

Strategic Cyber Security K Geers

Ratings: (0)|Views: 435|Likes:
Published by Theekuchi

More info:

Published by: Theekuchi on Aug 17, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/27/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 6 are not shown in this preview.
You're Reading a Free Preview
Pages 10 to 38 are not shown in this preview.
You're Reading a Free Preview
Pages 42 to 52 are not shown in this preview.
You're Reading a Free Preview
Pages 56 to 103 are not shown in this preview.
You're Reading a Free Preview
Pages 107 to 169 are not shown in this preview.

Activity (8)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
PacoSepulveda liked this
Mohd Azmi Arifin liked this
jjvdneut liked this
Oxony20 liked this
Oxony20 liked this
ilkoltulu liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->