• Complain

Robert Mandel - Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks

Here you can read online Robert Mandel - Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: Georgetown University Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Robert Mandel Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks
  • Book:
    Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks
  • Author:
  • Publisher:
    Georgetown University Press
  • Genre:
  • Year:
    2017
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Robert Mandel: author's other books


Who wrote Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
OPTIMIZING CYBERDETERRENCE
OPTIMIZING
CYBERDETERRENCE
A COMPREHENSIVE STRATEGY FOR
PREVENTING FOREIGN CYBERATTACKS
ROBERT MANDEL
2017 Georgetown University Press All rights reserved No part of this book may - photo 1
2017 Georgetown University Press. All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage and retrieval system, without permission in writing from the publisher.
The publisher is not responsible for third-party websites or their content. URL links were active at time of publication.
Library of Congress Cataloging-in-Publication Data
Names: Mandel, Robert, 1949 author.
Title: Optimizing Cyberdeterrence : A Comprehensive Strategy for
Preventing Foreign Cyberattacks / Robert Mandel.
Description: Washington, DC : Georgetown University Press, 2017. |
Includes bibliographical references and index.
Identifiers: LCCN 2016024168 (print) | LCCN 2016040085 (ebook) | ISBN 9781626164123 (hc : alk. paper) | ISBN 9781626164130 (pb : alk. paper) | ISBN 9781626164147 (eb)
Subjects: LCSH: CyberterrorismPrevention.
Classification: LCC HV6773 .M355 2017 (print) | LCC HV6773 (ebook) |
DDC
363.325dc23
LC record available at https://lccn.loc.gov/2016024168
Picture 2This book is printed on acid-free paper meeting the requirements of the American National Standard for Permanence in Paper for Printed Library Materials.
18 179 8 7 6 5 4 3 2 First printing
Printed in the United States of America
Cover design by Connie Gabbert
The only truly secure system is one that is powered off, cast in a block of concrete, and sealed in a lead-lined room with armed guards.
Gene Spafford, Purdue University computer science professor
and leading cybersecurity expert
Contrary to what the security industry now messages, prevention is not a failed strategy.
Anup Ghosh, chief executive officer and founder
of cybersecurity firm Invincea
Contents
Illustrations
Figures
Tables
Acknowledgments
O ptimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacksmy thirteenth bookhas utterly captured my imagination, for it deals with a human-constructed global security threat that in theory should be susceptible to man-made solutions yet in practice appears at least on the surface to defy every remedy. Ever since high school, I have been deeply fascinated with computer hardware and software and the opportunities and dangers embedded in the digital age. Because figuring out how to make cyberdeterrence work better requires a deep and wide integrated understanding of both technical and strategic issues, this investigation was extremely intellectually challenging. I am deeply indebted to my student research assistant Katherine Keller for her hard work and incredibly probing insights and to Don Jacobs of Georgetown University Press for his adept expert shepherding of this project to its completion. I also appreciate the ideas I received from academic colleagues in international relations and computer science and from government defense and intelligence officials. However, I alone take responsibility for any errors found here.
This book is dedicated to the British trio of Charles Babbage, George Boole, and Alan Turing for their role as the earliest computer science pioneers, as well as to those today in the public and private sectors who are tasked with the safety of sensitive data and systems and are struggling with ever-changing threats and technological challenges. This books aspiration is not only to give the public a glimmer of optimism about the protection of their digital assets but also to assist security officials in their quest to thwart efforts of adversaries who wish to steal, corrupt, or make inaccessible critical data. The best people currently working on cyber protection have to be amazingly creative and nimble in their thinking, and they deserve unbridled admiration and support from the rest of us.
Introduction
O ptimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks presents a distinctive strategic vision for cyberdeterrence to restrain foreign-based cyberattacks. This challenge is particularly daunting because traditional, narrow, direct deterrence (such as Cold War nuclear deterrence) is a poor match for the cyber realm. This book promotes a broader, more inclusive cyberdeterrence designed to alter the cyberattackers decision calculus. To accomplish this end through this means, Optimizing Cyberdeterrence contends that the potential targets of cyberattack need a fluid, integrated mix of strategies that is sensitive to differing circumstances. These strategies encompass (1) moving from just increasing cyberattackers losses to decreasing any prospects of cyberattackers gains, both maximizing certainty about high costs and minimizing certainty about high benefits (accounting for culturally different irrational adversaries); (2) moving from just national governments making decisions about restraining cyberattackers to including expanded private sector contributions, combining state officials input with that of private businesses and citizens; (3) moving from just perfecting past and ongoing standard, straightforward cyberattacker countermeasures to developing alternative cyberattacker countermeasures, combining direct, tangible orthodox restraints and indirect, intangible unorthodox restraints; (4) moving from just responding to cyberattackers in kind on the same playing field to adding cross-domain methods on other playing fieldsthat is, combining cyberspace and real-world responsesand (5) moving from just engaging in draconian intimidation of cyberattackers to finding sensible ways to convince cyberattackers to restrain themselves by combining fear-based physical prevention and hope-based perceptual persuasion.
This books uniqueness lies in its focus on (1) cyberthreat in the context of other security dangers, considering the relationship of cyberdeterrence with other security policies; (2) comprehensive coverage of twenty-first-century global cyberattack case studies with major security implications; (3) state and non-state threats and responses; (4) improvements in cyberdeterrence planning and execution strategies that combine maximizing high-cost certainty with minimizing high-benefit certainty countermeasures; public and private initiators; direct, tangible orthodox and indirect, intangible unorthodox restraints; cyberspace and real-world responses; and fear-based prevention and hope-based persuasion; (5) identification of conditions where preferred strategies work best; and (6) cyberdeterrence legitimacy and ethics dilemmas. The underlying aspiration is to provide a conceptually probing, empirically rich, and policy-relevant analysis that serves as a springboard from which to spur dramatic improvement in cyberdeterrence.
Exploring cyberdeterrence raises major thorny questions linked to the broader security and strategic studies literature. These issues include (1) the security impacts of technological diffusion, (2) the leveling of the global power hierarchy; (3) the challenges to dominant global values and security norms; (4) the increasingly non-transparent security transactions and indirect means of transnational influence (including social media); (5) the elusive threat initiation and outcome identification; (6) the growing state use of plausible deniability; (7) the increasingly hollow government promises or threats, erosion of state authority, and rising private sector responsibility; (8) the offensive-defensive strategic interrelationships; (9) the long-term stability problems through boomerang effects, action-reaction cycles, and conflict contagion; and (10) the societally divisive trade-offs between openness and secrecy, freedom and stability, safety and justice, fear and hope, and dependence and vulnerability. The common tendency to isolate cyberdeterrence policy from other defense issues thus needs to be overcome.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks»

Look at similar books to Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks»

Discussion, reviews of the book Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.