Crisis and escalation in cyberspace:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Santa Monica, Calif.
Rand Corp.
2012
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Libicki, Martin C.: Crisis and escalation in cyberspace Includes bibliographical references |
Beschreibung: | XXI, 172 S. Ill. |
ISBN: | 9780833076786 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040740970 | ||
003 | DE-604 | ||
005 | 20140806 | ||
007 | t | ||
008 | 130211s2012 xxua||| |||| 00||| eng d | ||
010 | |a 2012046227 | ||
020 | |a 9780833076786 |c pbk. : alk. paper |9 978-0-8330-7678-6 | ||
035 | |a (OCoLC)878082310 | ||
035 | |a (DE-599)BVBBV040740970 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 | ||
050 | 0 | |a U163 | |
082 | 0 | |a 358.4/141 | |
100 | 1 | |a Libicki, Martin C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Crisis and escalation in cyberspace |c Martin C. Libicki |
264 | 1 | |a Santa Monica, Calif. |b Rand Corp. |c 2012 | |
300 | |a XXI, 172 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Libicki, Martin C.: Crisis and escalation in cyberspace | ||
500 | |a Includes bibliographical references | ||
610 | 2 | 4 | |a United States |b Air Force |x Organization |
610 | 2 | 4 | |a United States |b Air Force |x Decision making |
610 | 2 | 7 | |a USA |b Air Force |0 (DE-588)872-2 |2 gnd |9 rswk-swf |
650 | 4 | |a Politik | |
650 | 4 | |a Information warfare |z United States | |
650 | 4 | |a Escalation (Military science) | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Crisis management |x Government policy |z United States | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Conflict management | |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Krisenmanagement |0 (DE-588)4127374-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Bekämpfung |0 (DE-588)4112701-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Terrorismus |0 (DE-588)4059534-1 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
689 | 0 | 0 | |a USA |b Air Force |0 (DE-588)872-2 |D b |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 3 | |a Terrorismus |0 (DE-588)4059534-1 |D s |
689 | 0 | 4 | |a Bekämpfung |0 (DE-588)4112701-8 |D s |
689 | 0 | 5 | |a Krisenmanagement |0 (DE-588)4127374-6 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025720908&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025720908 | ||
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |g 73 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 090511 |g 73 |
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090511 |g 73 |
942 | 1 | 1 | |c 609 |e 22/bsb |f 090512 |g 73 |
Datensatz im Suchindex
_version_ | 1804150061295206400 |
---|---|
adam_text | CRISIS AND ESCALATION IN CYBERSPACE
/ LIBICKI, MARTIN C.
: 2012
TABLE OF CONTENTS / INHALTSVERZEICHNIS
AVOIDING CRISES BY CREATING NORMS
NARRATIVES, DIALOGUES, AND SIGNALING
ESCALATION MANAGEMENT
STRATEGIC STABILITY
CONCLUSIONS AND RECOMMENDATIONS FOR THE AIR FORCE
INTRODUCTION
SOME HYPOTHETICAL CRISES
MUTUAL MISTRUST IS LIKELY TO CHARACTERIZE A CYBER CRISIS
STATES MAY HAVE ROOM FOR MANEUVER IN A CYBER CRISIS
A NOTE ON METHODOLOGY
PURPOSE AND ORGANIZATION
AVOIDING CRISES BY CREATING NORMS
WHAT KIND OF NORMS MIGHT BE USEFUL?
ENFORCE LAWS AGAINST HACKING
DISASSOCIATE FROM FREELANCE HACKERS
DISCOURAGE COMMERCIAL ESPIONAGE
BE CAREFUL ABOUT THE OBLIGATION TO SUPPRESS CYBER TRAFFIC
HOW DO WE ENFORCE NORMS?
CONFIDENCE-BUILDING MEASURES
NORMS FOR VICTIMS OF CYBERATTACKS
NORMS FOR WAR?
DECEPTION
MILITARY NECESSITY AND COLLATERAL DAMAGE
PROPORTIONALITY
REVERSIBILITY
CONCLUSIONS
NARRATIVES, DIALOGUE, AND SIGNALS
NARRATIVES TO PROMOTE CONTROL
A NARRATIVE FRAMEWORK FOR CYBERSPACE
VICTIMIZATION, ATTRIBUTION, RETALIATION, AND AGGRESSION
VICTIMIZATION
ATTRIBUTION
RETALIATION
AGGRESSION
EMOLLIENTS: NARRATIVES TO WALK BACK A CRISIS
WE DID NOTHING
WELL, AT LEAST NOT ON OUR ORDERS
IT WAS AN ACCIDENT
THIS IS NOTHING NEW
AT LEAST IT DOES NOT PORTEND ANYTHING
BROADER CONSIDERATIONS
SIGNALS
AMBIGUITY IN SIGNALING
SIGNALING RESOLVE
SIGNALING THAT CYBER COMBAT IS NOT KINETIC COMBAT
CONCLUSIONS
ESCALATION MANAGEMENT
MOTIVES FOR ESCALATION
DOES ESCALATION MATTER?
ESCALATION RISKS
ESCALATION RISKS IN PHASE
ESCALATION RISKS FOR CONTAINED LOCAL CONFLICTS
ESCALATION RISKS FOR UNCONTAINED CONFLICTS
MANAGING PROXY CYBERATTACKS
WHAT HIDDEN COMBATANTS IMPLY FOR HORIZONTAL ESCALATION
MANAGING OVERT PROXY CONFLICT
THE DIFFICULTIES OF TIT-FOR-TAT MANAGEMENT
THE IMPORTANCE OF PRE-PLANNING
DISJUNCTIONS AMONG EFFORT, EFFECT, AND PERCEPTION
INADVERTENT ESCALATION
ESCALATION INTO KINETIC WARFARE
ESCALATION INTO ECONOMIC WARFARE
SUB ROSA ESCALATION
MANAGING THE THIRD-PARTY PROBLEM
THE NEED FOR A CLEAN SHOT
INFERENCE AND NARRATIVE
COMMAND AND CONTROL
COMMANDERS
THOSE THEY COMMAND
CONCLUSIONS
IMPLICATIONS FOR STRATEGIC STABILITY
TRANSLATING SOURCES OF COLD WAR INSTABILITY TO CYBERSPACE
WHAT INFLUENCE CAN CYBERWAR HAVE IF NUCLEAR WEAPONS EXIST?
CAN CYBERWAR DISARM ANOTHER STATE S NUCLEAR CAPABILITIES?
CAN CYBERWAR DISARM ANOTHER STATES CYBERWARRIORS?
DOES CYBERWAR LEND ITSELF TO ALERT-REACTION CYCLES?
ARE CYBERDEFENSES INHERENTLY DESTABILIZING?
WOULD A CYBERSPACE ARMS RACES BE DESTABILIZING?
MISPERCEPTION AS A SOURCE OF CRISIS
SIDE TAKES GREAT EXCEPTION TO CYBERESPIONAGE
DEFENSES ARE MISINTERPRETED AS PREPARATIONS FOR WAR
TOO MUCH CONFIDENCE IN ATTRIBUTION
TOO MUCH CONFIDENCE IN OR FEAR OF PRE-EMPTION
SUPPOSEDLY RISK-FREE CYBERATTACKS
NEUTRALITY
CONCLUSIONS
CAN CYBER CRISES BE MANAGED?
A. DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
B. OVERT, OBVIOUS, AND COVERT CYBERATTACKS AND RESPONSES
CAN GOOD CYBERDEFENSES DISCOURAGE ATTACKS?
BIBLIOGRAPHY
FIGURES
FIGURE 1: ALTERNATIVE POSTURES FOR A MASTER CYBER NARRATIVE
FIGURE 2: SOURCES OF IMPRECISION IN TIT FOR TAT
FIGURE 3: AN INADVERTENT PATH TO MUTUAL ESCALATION
FIGURE A-1: CONFIGURING NETWORKS TO LIMIT THE DAMAGE OF DDOS ATTACKS
TABLE
OVERT, OBVIOUS, AND COVERT CYBERATTACKS AND RESPONSES.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Libicki, Martin C. |
author_facet | Libicki, Martin C. |
author_role | aut |
author_sort | Libicki, Martin C. |
author_variant | m c l mc mcl |
building | Verbundindex |
bvnumber | BV040740970 |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 |
callnumber-search | U163 |
callnumber-sort | U 3163 |
callnumber-subject | U - General Military Science |
ctrlnum | (OCoLC)878082310 (DE-599)BVBBV040740970 |
dewey-full | 358.4/141 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 358 - Air & other specialized forces |
dewey-raw | 358.4/141 |
dewey-search | 358.4/141 |
dewey-sort | 3358.4 3141 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02541nam a2200661zc 4500</leader><controlfield tag="001">BV040740970</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140806 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130211s2012 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2012046227</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833076786</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">978-0-8330-7678-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)878082310</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040740970</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">U163</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">358.4/141</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Crisis and escalation in cyberspace</subfield><subfield code="c">Martin C. Libicki</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, Calif.</subfield><subfield code="b">Rand Corp.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 172 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Libicki, Martin C.: Crisis and escalation in cyberspace</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="b">Air Force</subfield><subfield code="x">Organization</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="b">Air Force</subfield><subfield code="x">Decision making</subfield></datafield><datafield tag="610" ind1="2" ind2="7"><subfield code="a">USA</subfield><subfield code="b">Air Force</subfield><subfield code="0">(DE-588)872-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Escalation (Military science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crisis management</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Conflict management</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Krisenmanagement</subfield><subfield code="0">(DE-588)4127374-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="b">Air Force</subfield><subfield code="0">(DE-588)872-2</subfield><subfield code="D">b</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Terrorismus</subfield><subfield code="0">(DE-588)4059534-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Bekämpfung</subfield><subfield code="0">(DE-588)4112701-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Krisenmanagement</subfield><subfield code="0">(DE-588)4127374-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025720908&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025720908</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090511</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090511</subfield><subfield code="g">73</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">73</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV040740970 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:32:56Z |
institution | BVB |
isbn | 9780833076786 |
language | English |
lccn | 2012046227 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025720908 |
oclc_num | 878082310 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | XXI, 172 S. Ill. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Rand Corp. |
record_format | marc |
spelling | Libicki, Martin C. Verfasser aut Crisis and escalation in cyberspace Martin C. Libicki Santa Monica, Calif. Rand Corp. 2012 XXI, 172 S. Ill. txt rdacontent n rdamedia nc rdacarrier Libicki, Martin C.: Crisis and escalation in cyberspace Includes bibliographical references United States Air Force Organization United States Air Force Decision making USA Air Force (DE-588)872-2 gnd rswk-swf Politik Information warfare United States Escalation (Military science) Cyberspace Security measures Crisis management Government policy United States Cyberterrorism Prevention Conflict management Cyberspace (DE-588)4266146-8 gnd rswk-swf Krisenmanagement (DE-588)4127374-6 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Bekämpfung (DE-588)4112701-8 gnd rswk-swf Terrorismus (DE-588)4059534-1 gnd rswk-swf USA USA Air Force (DE-588)872-2 b Information warfare (DE-588)4461975-3 s Cyberspace (DE-588)4266146-8 s Terrorismus (DE-588)4059534-1 s Bekämpfung (DE-588)4112701-8 s Krisenmanagement (DE-588)4127374-6 s DE-604 LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025720908&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Libicki, Martin C. Crisis and escalation in cyberspace United States Air Force Organization United States Air Force Decision making USA Air Force (DE-588)872-2 gnd Politik Information warfare United States Escalation (Military science) Cyberspace Security measures Crisis management Government policy United States Cyberterrorism Prevention Conflict management Cyberspace (DE-588)4266146-8 gnd Krisenmanagement (DE-588)4127374-6 gnd Information warfare (DE-588)4461975-3 gnd Bekämpfung (DE-588)4112701-8 gnd Terrorismus (DE-588)4059534-1 gnd |
subject_GND | (DE-588)872-2 (DE-588)4266146-8 (DE-588)4127374-6 (DE-588)4461975-3 (DE-588)4112701-8 (DE-588)4059534-1 |
title | Crisis and escalation in cyberspace |
title_auth | Crisis and escalation in cyberspace |
title_exact_search | Crisis and escalation in cyberspace |
title_full | Crisis and escalation in cyberspace Martin C. Libicki |
title_fullStr | Crisis and escalation in cyberspace Martin C. Libicki |
title_full_unstemmed | Crisis and escalation in cyberspace Martin C. Libicki |
title_short | Crisis and escalation in cyberspace |
title_sort | crisis and escalation in cyberspace |
topic | United States Air Force Organization United States Air Force Decision making USA Air Force (DE-588)872-2 gnd Politik Information warfare United States Escalation (Military science) Cyberspace Security measures Crisis management Government policy United States Cyberterrorism Prevention Conflict management Cyberspace (DE-588)4266146-8 gnd Krisenmanagement (DE-588)4127374-6 gnd Information warfare (DE-588)4461975-3 gnd Bekämpfung (DE-588)4112701-8 gnd Terrorismus (DE-588)4059534-1 gnd |
topic_facet | United States Air Force Organization United States Air Force Decision making USA Air Force Politik Information warfare United States Escalation (Military science) Cyberspace Security measures Crisis management Government policy United States Cyberterrorism Prevention Conflict management Cyberspace Krisenmanagement Information warfare Bekämpfung Terrorismus USA |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025720908&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT libickimartinc crisisandescalationincyberspace |