Internet governance in an age of cyber insecurity:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Council on Foreign Relations
c2010
|
Schriftenreihe: | CSR (New York, N.Y.)
no.56 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "September 2010". - Mode of access: Internet from Council on Foreign Relations web site. Adobe Acrobat Reader required Includes bibliographical references (p.32-33) Introduction -- Background -- Rethinking U.S. interests in cyberspace -- Principles for engagement -- Pursuing international engagement -- Organizing the U.S. effort -- Conclusion The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than $1 trillion, while coordinated cyberattacks have crippled Estonia, Georgia, and Kyrgyzstan and compromised critical infrastructure in countries around the world. While no fewer than six UN bodies and multiple regional and national forums have sought to build a consensus on the future of Internet governance, there has been little progress thus far. The United States has largely abstained from these discussions, instead focusing on developing its own offensive and defensive cybersecurity capabilities while entrusting the ongoing stability of the system to the expertise of the private sector. In this Council Special Report, Robert K. Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes |
Beschreibung: | 1 Online-Ressource (x, 43 p.) |
ISBN: | 0876094817 0876094914 9780876094815 9780876094914 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043157307 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2010 |||| o||u| ||||||eng d | ||
020 | |a 0876094817 |9 0-87609-481-7 | ||
020 | |a 0876094914 |c electronic bk. |9 0-87609-491-4 | ||
020 | |a 9780876094815 |9 978-0-87609-481-5 | ||
020 | |a 9780876094914 |c electronic bk. |9 978-0-87609-491-4 | ||
035 | |a (OCoLC)792730690 | ||
035 | |a (DE-599)BVBBV043157307 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 004 |2 22 | |
100 | 1 | |a Knake, Robert K. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Internet governance in an age of cyber insecurity |c Robert K. Knake |
264 | 1 | |a New York, NY |b Council on Foreign Relations |c c2010 | |
300 | |a 1 Online-Ressource (x, 43 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a CSR (New York, N.Y.) |v no.56 | |
500 | |a "September 2010". - Mode of access: Internet from Council on Foreign Relations web site. Adobe Acrobat Reader required | ||
500 | |a Includes bibliographical references (p.32-33) | ||
500 | |a Introduction -- Background -- Rethinking U.S. interests in cyberspace -- Principles for engagement -- Pursuing international engagement -- Organizing the U.S. effort -- Conclusion | ||
500 | |a The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than $1 trillion, while coordinated cyberattacks have crippled Estonia, Georgia, and Kyrgyzstan and compromised critical infrastructure in countries around the world. While no fewer than six UN bodies and multiple regional and national forums have sought to build a consensus on the future of Internet governance, there has been little progress thus far. The United States has largely abstained from these discussions, instead focusing on developing its own offensive and defensive cybersecurity capabilities while entrusting the ongoing stability of the system to the expertise of the private sector. In this Council Special Report, Robert K. | ||
500 | |a Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. | ||
500 | |a Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes | ||
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 4 | |a Informatik | |
650 | 4 | |a Internet |x Security measures |z United States | |
650 | 4 | |a Internet governance |z United States | |
650 | 4 | |a Computer crimes |z United States |x Prevention | |
650 | 4 | |a Internet in espionage |z United States | |
650 | 4 | |a Cyberterrorism |x Prevention |x International cooperation | |
651 | 4 | |a USA | |
710 | 2 | |a Council on Foreign Relations |b International Institutions and Global Governance Program |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=448136 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028581498 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=448136 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=448136 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175623802847232 |
---|---|
any_adam_object | |
author | Knake, Robert K. |
author_facet | Knake, Robert K. |
author_role | aut |
author_sort | Knake, Robert K. |
author_variant | r k k rk rkk |
building | Verbundindex |
bvnumber | BV043157307 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)792730690 (DE-599)BVBBV043157307 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04756nmm a2200613zcb4500</leader><controlfield tag="001">BV043157307</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0876094817</subfield><subfield code="9">0-87609-481-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0876094914</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-87609-491-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780876094815</subfield><subfield code="9">978-0-87609-481-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780876094914</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-87609-491-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)792730690</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043157307</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Knake, Robert K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet governance in an age of cyber insecurity</subfield><subfield code="c">Robert K. Knake</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Council on Foreign Relations</subfield><subfield code="c">c2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 43 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">CSR (New York, N.Y.)</subfield><subfield code="v">no.56</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"September 2010". - Mode of access: Internet from Council on Foreign Relations web site. Adobe Acrobat Reader required</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p.32-33)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- Background -- Rethinking U.S. interests in cyberspace -- Principles for engagement -- Pursuing international engagement -- Organizing the U.S. effort -- Conclusion</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than $1 trillion, while coordinated cyberattacks have crippled Estonia, Georgia, and Kyrgyzstan and compromised critical infrastructure in countries around the world. While no fewer than six UN bodies and multiple regional and national forums have sought to build a consensus on the future of Internet governance, there has been little progress thus far. The United States has largely abstained from these discussions, instead focusing on developing its own offensive and defensive cybersecurity capabilities while entrusting the ongoing stability of the system to the expertise of the private sector. In this Council Special Report, Robert K. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet governance</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet in espionage</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="x">International cooperation</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Council on Foreign Relations</subfield><subfield code="b">International Institutions and Global Governance Program</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=448136</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028581498</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=448136</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=448136</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043157307 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:14Z |
institution | BVB |
isbn | 0876094817 0876094914 9780876094815 9780876094914 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028581498 |
oclc_num | 792730690 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (x, 43 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Council on Foreign Relations |
record_format | marc |
series2 | CSR (New York, N.Y.) |
spelling | Knake, Robert K. Verfasser aut Internet governance in an age of cyber insecurity Robert K. Knake New York, NY Council on Foreign Relations c2010 1 Online-Ressource (x, 43 p.) txt rdacontent c rdamedia cr rdacarrier CSR (New York, N.Y.) no.56 "September 2010". - Mode of access: Internet from Council on Foreign Relations web site. Adobe Acrobat Reader required Includes bibliographical references (p.32-33) Introduction -- Background -- Rethinking U.S. interests in cyberspace -- Principles for engagement -- Pursuing international engagement -- Organizing the U.S. effort -- Conclusion The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than $1 trillion, while coordinated cyberattacks have crippled Estonia, Georgia, and Kyrgyzstan and compromised critical infrastructure in countries around the world. While no fewer than six UN bodies and multiple regional and national forums have sought to build a consensus on the future of Internet governance, there has been little progress thus far. The United States has largely abstained from these discussions, instead focusing on developing its own offensive and defensive cybersecurity capabilities while entrusting the ongoing stability of the system to the expertise of the private sector. In this Council Special Report, Robert K. Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Informatik Internet Security measures United States Internet governance United States Computer crimes United States Prevention Internet in espionage United States Cyberterrorism Prevention International cooperation USA Council on Foreign Relations International Institutions and Global Governance Program Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=448136 Aggregator Volltext |
spellingShingle | Knake, Robert K. Internet governance in an age of cyber insecurity COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Informatik Internet Security measures United States Internet governance United States Computer crimes United States Prevention Internet in espionage United States Cyberterrorism Prevention International cooperation |
title | Internet governance in an age of cyber insecurity |
title_auth | Internet governance in an age of cyber insecurity |
title_exact_search | Internet governance in an age of cyber insecurity |
title_full | Internet governance in an age of cyber insecurity Robert K. Knake |
title_fullStr | Internet governance in an age of cyber insecurity Robert K. Knake |
title_full_unstemmed | Internet governance in an age of cyber insecurity Robert K. Knake |
title_short | Internet governance in an age of cyber insecurity |
title_sort | internet governance in an age of cyber insecurity |
topic | COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Informatik Internet Security measures United States Internet governance United States Computer crimes United States Prevention Internet in espionage United States Cyberterrorism Prevention International cooperation |
topic_facet | COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Informatik Internet Security measures United States Internet governance United States Computer crimes United States Prevention Internet in espionage United States Cyberterrorism Prevention International cooperation USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=448136 |
work_keys_str_mv | AT knakerobertk internetgovernanceinanageofcyberinsecurity AT councilonforeignrelationsinternationalinstitutionsandglobalgovernanceprogram internetgovernanceinanageofcyberinsecurity |