Includes bibliographical references (pages 225-214)
CONTENTS NOTE
Text of Note
Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control
0
SUMMARY OR ABSTRACT
Text of Note
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack
ACQUISITION INFORMATION NOTE
Source for Acquisition/Subscription Address
OverDrive, Inc.
Source for Acquisition/Subscription Address
JSTOR
Stock Number
21F0755D-8437-444E-B890-D7B9A2F37888
Stock Number
22573/cttgkvj
OTHER EDITION IN ANOTHER MEDIUM
Title
Cyberdeterrence and cyberwar.
International Standard Book Number
9780833047342
TOPICAL NAME USED AS SUBJECT
Civil defense-- United States
Computer networks-- Security measures-- United States