Cyber conflict: competing national perspectives
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
London
ISTE
2012
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxiv, 319 S. ill. |
ISBN: | 9781848213500 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040233503 | ||
003 | DE-604 | ||
005 | 20130326 | ||
007 | t | ||
008 | 120604s2012 a||| |||| 00||| eng d | ||
020 | |a 9781848213500 |9 978-1-84821-350-0 | ||
035 | |a (OCoLC)796264632 | ||
035 | |a (DE-599)BVBBV040233503 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-473 | ||
082 | 0 | |a 363.325 |2 23 | |
084 | |a ST 650 |0 (DE-625)143687: |2 rvk | ||
245 | 1 | 0 | |a Cyber conflict |b competing national perspectives |c ed. by Daniel Ventre |
250 | |a 1. publ. | ||
264 | 1 | |a London |b ISTE |c 2012 | |
300 | |a xxiv, 319 S. |b ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Cyberterrorism / Prevention | |
650 | 4 | |a Cyberspace / Security measures | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Information warfare | |
650 | 4 | |a National security | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ventre, Daniel |e Sonstige |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025089866&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025089866 |
Datensatz im Suchindex
_version_ | 1804149222039093248 |
---|---|
adam_text | Table
of
Contents
Introduction
........................................ xi
Chapter
1.
Canada s Cyber Security Policy: a Tortuous Path
Toward a Cyber Security Strategy
......................... 1
Hugo Loiseau and
Lina Lemay
1.1.
Introduction
.................................... 1
1.2.
Canada in North America: sovereign but subordinate?
.......... 4
1.3.
Counter-terrorism for the improvement of national security
....... 13
1.4.
The long path to a national
CI
protection strategy and national
cyber security strategy
................................ 25
1.5.
The adoption of the current strategies for
CI
protection
and cyber security
................................... 31
1.6.
Conclusion
.................................... 37
1.7.
Bibliography
................................... 38
1.7.1.
Scientific and media articles
....................... 39
1.7.2.
Primary Data
................................. 40
1.7.3.
Websites
................................... 44
Chapter
2.
Cuba: Towards an Active Cyber-defense
.............. 45
Daniel
Ventre
2.1.
Cyberspace: statistics and history
....................... 47
2.1.1.
The marginalization of Cuba
....................... 47
2.1.2.
Cuban cyberspace as the target of attacks
............... 50
2.2.
Theoretical and practical considerations on information warfare
and cyber-warfare
................................... 54
2.2.1.
Development of capabilities
....................... 54
2.3.
Cyber-warfare theories and practices
..................... 56
2.3.1.
Fidel Castro s discourse
.......................... 57
vi
Cyber Conflict
2.3.2.
The concept of active cyber-defense
................... 59
2.4.
Regulations and ways around them
...................... 60
2.4.1.
The State s influence over cyberspace
................. 61
2.4.2.
Getting around the restrictions
...................... 63
2.5.
Capabilities of control, surveillance and interception
........... 65
2.6.
Enemies
...................................... 66
2.7.
Conclusion
.................................... 70
2.8.
Bibliography
................................... 73
Chapter
3.
French Perspectives on Cyber-conflict
................ 77
Daniel
Ventre
3.1.
Cyberspace
.................................... 79
3.2.
Assessments, view on the world and awakening
.............. 88
3.2.1.
Attacks
.................................... 88
3.2.2.
The feeling of insecurity, the threat
................... 93
3.2.3.
Potential vulnerabilities of States
.................... 98
3.2.4.
Evolution of the international environment
............... 99
3.3.
Reaction, position of France and choice: theories, political
strategies and military doctrines
.......................... 100
3.3.1.
Information: a powerful weapon for those controlling it
....... 100
3.3.2.
Media information: beneficial if controlled
.............. 101
3.3.3.
Economic information as power, if controlled
............. 101
3.3.4.
Information warfare
............................ 102
3.3.5.
Information warfare or information control
.............. 103
3.3.6.
The ANSSI
.................................. 104
3.3.7.
Cyber-security and cyber-defense
.................... 106
3.3.8.
Army: Information operations, NEB
(numérisation de
l espace de bataille/digitization
of battlespace), info-development
.... 108
3.3.9.
Cyber-war and other modalities of the cyber-conflict
........ 120
3.4.
Conclusion
.................................... 127
3.5.
Bibliography
................................... 131
Chapter
4.
Digital Sparta: Information Operations
and Cyber-warfare in Greece
............................. 135
Joseph Fitsanakis
4.1.
Geopolitical significance
............................ 136
4.2.
Strategic concerns and internal balancing
.................. 139
4.3.
Formative experiences in information operations:
the Ergenekon conspiracy
.............................. 141
4.4.
Formative experiences in information operations:
intensifying cyber-attacks
.............................. 142
Table
of
Contents
vii
4.5.
Formative
experiences in information operations:
the
Öcalan
affair
.................................... 143
4.6.
Formative experiences in information operations:
the Greek wiretapping case of
2004-2005.................... 145
4.7.
Emerging civilian information operations strategies
............ 148
4.8.
Emerging military information operations strategies
........... 152
4.9.
The European Union dimension in Greek information operations.
... 155
4.10.
Conclusion
................................... 156
4.11.
Bibliography
.................................. 158
Chapter
5.
Moving Toward an Italian Cyber Defense
and Security Strategy
.................................. 165
Stefania
Ducei
5.1.
Information warfare and cyber warfare: what are they?
.......... 165
5.2.
Understanding the current Italian geopolitical context
.......... 168
5.3.
The Italian legal and organizational framework
.............. 172
5.4.
The need for a national cyber-defense and-security strategy
...... 177
5.5.
Conclusion
.................................... 188
5.6.
Bibliography
................................... 188
Chapter
6.
Cyberspace in Japan s New Defense Strategy
........... 193
Daniel
Ventre
6.1.
Japan s defense policy
............................. 194
6.2.
Cyberspace in Japan s defense strategy
................... 197
6.2.1.
The context
................................. 197
6.2.2.
Cyberspace in security and defense policies
.............. 203
6.3.
Conclusion
.................................... 217
6.4.
Bibliography
................................... 221
Chapter
7.
Singapore s Encounter with Information Warfare:
Filtering Electronic Globalization and Military Enhancements
....... 223
Alan Chong
7.1.
Singapore: electronic globalization and its pitfalls
............. 225
7.2.
Cyberdefence in the private sector and society at large
.......... 228
7.3.
The Singapore Armed Forces and the embrace
of third-generation warfare
............................. 235
7.3.1.
Force multiplication
............................ 237
7.3.2.
Continually revitalizing existing conventional arms
capabilities
...................................... 239
7.3.3.
Generating asymmetrical advantages in operational
transparency
..................................... 242
viii Cyber Conflict
7.4.
Conclusion
.................................... 245
7.5.
Bibliography
................................... 247
Chapter
8.
A Slovenian Perspective on Cyber Warfare
............ 251
Gorazd Praprotnik, Iztok Podbregar, Igor Bernik and
Bojan TiČAR
8.1.
Introduction
.................................... 251
8.2.
Preparations for digital warfare
........................ 254
8.3.
Specifics of technologically-advanced small countries
.......... 256
8.4.
Geostrategic, geopolitics and the economic position
of the Republic of Slovenia
............................. 258
8.5.
Information and communication development in Slovenia
........ 259
8.6.
Cyber-threats in Slovenia
............................ 261
8.7.
Slovenia in the field of information and communication
security policy
..................................... 264
8.8.
Slovenia s information and communication security
policy strategy
..................................... 266
8.8.1.
The
EU
information and communication security policy
...... 266
8.8.2.
NATO s information and communications security policy
..... 267
8.8.3.
Slovenia s information and communication security policy
..... 268
8.8.4.
Analysis of key strategic documents regulating the field
of information and communication security policy
in the Republic of Slovenia
............................ 269
8.8.5.
National bodies that govern the field
ofinformation
and communication security policy in the Republic of Slovenia
...... 270
8.8.6.
Directorate for information society (Ministry of Higher
Education, Science and Technology)
...................... 271
8.8.7.
Slovenian Computer Emergency Response Team
........... 271
8.8.8.
Directorate of
е
-Government and Administrative Processes
(Ministry of Public Administration)
....................... 272
8.8.9.
Office of the Government of the Republic of Slovenia
for the Protection of Classified Information
.................. 272
8.8.10.
Slovenian Intelligence and Security Agency
............. 273
8.8.11.
National Center for Crisis Management
................ 274
8.9.
Conclusion
.................................... 274
8.10.
Bibliography
.................................. 276
Chapter
9.
A South African Perspective on Information Warfare
and Cyber Warfare
................................... 279
Brett van Niekerk and Manoj Maharaj
9.1.
The South African structure
ofinformation
warfare
............ 280
9.2.
A South African perspective on cyber-warfare
............... 283
9.3.
The Southern African cyber-environment
.................. 284
Table
of
Contents ix
9.4.
Legislation
.................................... 288
9.5. Cyber-security
and information warfare organizations
in South Africa
.................................... 289
9.6.
Estimated cyber-warfare capability in Africa
................ 290
9.7.
Conclusion
.................................... 291
9.8.
Bibliography
................................... 292
Chapter
10.
Conclusion
................................. 297
Daniel
Ventre
10.1.
Cyberspace
................................... 301
10.2.
Bibliography
.................................. 306
List of Authors
...................................... 307
Index
............................................ 309
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040233503 |
classification_rvk | ST 650 |
ctrlnum | (OCoLC)796264632 (DE-599)BVBBV040233503 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Informatik Soziologie |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01560nam a2200421 c 4500</leader><controlfield tag="001">BV040233503</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130326 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120604s2012 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781848213500</subfield><subfield code="9">978-1-84821-350-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)796264632</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040233503</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 650</subfield><subfield code="0">(DE-625)143687:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber conflict</subfield><subfield code="b">competing national perspectives</subfield><subfield code="c">ed. by Daniel Ventre</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">ISTE</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiv, 319 S.</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ventre, Daniel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025089866&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025089866</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV040233503 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:19:35Z |
institution | BVB |
isbn | 9781848213500 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025089866 |
oclc_num | 796264632 |
open_access_boolean | |
owner | DE-12 DE-473 DE-BY-UBG |
owner_facet | DE-12 DE-473 DE-BY-UBG |
physical | xxiv, 319 S. ill. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | ISTE |
record_format | marc |
spelling | Cyber conflict competing national perspectives ed. by Daniel Ventre 1. publ. London ISTE 2012 xxiv, 319 S. ill. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Cyberterrorism / Prevention Cyberspace / Security measures Computer networks / Security measures Information warfare National security Information warfare (DE-588)4461975-3 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Information warfare (DE-588)4461975-3 s DE-604 Ventre, Daniel Sonstige oth Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025089866&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cyber conflict competing national perspectives Cyberterrorism / Prevention Cyberspace / Security measures Computer networks / Security measures Information warfare National security Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4143413-4 |
title | Cyber conflict competing national perspectives |
title_auth | Cyber conflict competing national perspectives |
title_exact_search | Cyber conflict competing national perspectives |
title_full | Cyber conflict competing national perspectives ed. by Daniel Ventre |
title_fullStr | Cyber conflict competing national perspectives ed. by Daniel Ventre |
title_full_unstemmed | Cyber conflict competing national perspectives ed. by Daniel Ventre |
title_short | Cyber conflict |
title_sort | cyber conflict competing national perspectives |
title_sub | competing national perspectives |
topic | Cyberterrorism / Prevention Cyberspace / Security measures Computer networks / Security measures Information warfare National security Information warfare (DE-588)4461975-3 gnd |
topic_facet | Cyberterrorism / Prevention Cyberspace / Security measures Computer networks / Security measures Information warfare National security Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025089866&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ventredaniel cyberconflictcompetingnationalperspectives |