Rethinking cybersecurity :: strategy, mass effect, and states /
Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pea...
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaft: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Washington, DC : Lanham, MD :
Center for Strategic & International Studies ; Rowman & Littlefield,
[2018]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity. |
Beschreibung: | "January 2018." A report of the CSIS Technology Program. |
Beschreibung: | 1 online resource |
ISBN: | 9781442280526 1442280522 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1020319142 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 180125s2018 dcu o 000 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d EBLCP |d NLE |d OCLCF |d OCLCA |d YDX |d AJB |d NRC |d TEFOD |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d OCLCO |d OCLCL |d TMA |d OCLCQ |d SXB |d OCLCQ | ||
019 | |a 1021099401 | ||
020 | |a 9781442280526 |q (electronic bk.) | ||
020 | |a 1442280522 |q (electronic bk.) | ||
020 | |z 9781442280519 | ||
035 | |a (OCoLC)1020319142 |z (OCoLC)1021099401 | ||
037 | |a 84D10462-CADF-4371-907C-9BAE1270A83B |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Lewis, James Andrew, |d 1953- |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjBYxM8Hpmh4dK8BP7fKBP |0 http://id.loc.gov/authorities/names/n2001008696 | |
245 | 1 | 0 | |a Rethinking cybersecurity : |b strategy, mass effect, and states / |c author: James Andrew Lewis. |
264 | 1 | |a Washington, DC : |b Center for Strategic & International Studies ; |a Lanham, MD : |b Rowman & Littlefield, |c [2018] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a "January 2018." | ||
500 | |a A report of the CSIS Technology Program. | ||
520 | |a Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity. | ||
588 | 0 | |a Vendor-supplied metadata. | |
505 | 0 | |a Introduction: Structuring security for the digital revolution. -- Chapter 1: Outdated ideas guide cybersecurity. -- Chapter 2: States are the most dangerous actors. -- Chapter 3: Misperception and mirror imaging. -- Chapter 4: Cyber operations and interstate conflict. -- Chapter 5: Political and strategic constraints on cyber attack. -- Chapter 6: Rethinking principles for cybersecurity. -- Chapter 7: Moving to a new paradigm. -- About the author. | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
655 | 4 | |a Electronic book. | |
710 | 2 | |a Center for Strategic and International Studies (Washington, D.C.) |0 http://id.loc.gov/authorities/names/n86119921 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1694016 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH33836470 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5233949 | ||
938 | |a EBSCOhost |b EBSC |n 1694016 | ||
938 | |a YBP Library Services |b YANK |n 15114967 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1020319142 |
---|---|
_version_ | 1816882411663785984 |
adam_text | |
any_adam_object | |
author | Lewis, James Andrew, 1953- |
author_GND | http://id.loc.gov/authorities/names/n2001008696 |
author_corporate | Center for Strategic and International Studies (Washington, D.C.) |
author_corporate_role | |
author_facet | Lewis, James Andrew, 1953- Center for Strategic and International Studies (Washington, D.C.) |
author_role | aut |
author_sort | Lewis, James Andrew, 1953- |
author_variant | j a l ja jal |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction: Structuring security for the digital revolution. -- Chapter 1: Outdated ideas guide cybersecurity. -- Chapter 2: States are the most dangerous actors. -- Chapter 3: Misperception and mirror imaging. -- Chapter 4: Cyber operations and interstate conflict. -- Chapter 5: Political and strategic constraints on cyber attack. -- Chapter 6: Rethinking principles for cybersecurity. -- Chapter 7: Moving to a new paradigm. -- About the author. |
ctrlnum | (OCoLC)1020319142 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03271cam a2200529 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1020319142</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">180125s2018 dcu o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">NLE</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCA</subfield><subfield code="d">YDX</subfield><subfield code="d">AJB</subfield><subfield code="d">NRC</subfield><subfield code="d">TEFOD</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1021099401</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781442280526</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1442280522</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781442280519</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1020319142</subfield><subfield code="z">(OCoLC)1021099401</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">84D10462-CADF-4371-907C-9BAE1270A83B</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lewis, James Andrew,</subfield><subfield code="d">1953-</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjBYxM8Hpmh4dK8BP7fKBP</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001008696</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Rethinking cybersecurity :</subfield><subfield code="b">strategy, mass effect, and states /</subfield><subfield code="c">author: James Andrew Lewis.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, DC :</subfield><subfield code="b">Center for Strategic & International Studies ;</subfield><subfield code="a">Lanham, MD :</subfield><subfield code="b">Rowman & Littlefield,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"January 2018."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">A report of the CSIS Technology Program.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Vendor-supplied metadata.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction: Structuring security for the digital revolution. -- Chapter 1: Outdated ideas guide cybersecurity. -- Chapter 2: States are the most dangerous actors. -- Chapter 3: Misperception and mirror imaging. -- Chapter 4: Cyber operations and interstate conflict. -- Chapter 5: Political and strategic constraints on cyber attack. -- Chapter 6: Rethinking principles for cybersecurity. -- Chapter 7: Moving to a new paradigm. -- About the author.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Center for Strategic and International Studies (Washington, D.C.)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n86119921</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1694016</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH33836470</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5233949</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1694016</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15114967</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-on1020319142 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:28:11Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n86119921 |
isbn | 9781442280526 1442280522 |
language | English |
oclc_num | 1020319142 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Center for Strategic & International Studies ; Rowman & Littlefield, |
record_format | marc |
spelling | Lewis, James Andrew, 1953- author. https://id.oclc.org/worldcat/entity/E39PCjBYxM8Hpmh4dK8BP7fKBP http://id.loc.gov/authorities/names/n2001008696 Rethinking cybersecurity : strategy, mass effect, and states / author: James Andrew Lewis. Washington, DC : Center for Strategic & International Studies ; Lanham, MD : Rowman & Littlefield, [2018] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier "January 2018." A report of the CSIS Technology Program. Despite all the attention, cyberspace is far from secure. Why this is so reflects conceptual weaknesses more than imperfect technologies. Two questions highlight shortcomings in the discussion of cybersecurity. The first is why, after more than two decades, we have not seen anything like a cyber Pearl Harbor, cyber 9/11, or cyber catastrophe. The second is why, despite the increasing quantity of recommendations, there has been so little progress. This report explores these questions and assesses the accuracy of our perceptions of cybersecurity. Vendor-supplied metadata. Introduction: Structuring security for the digital revolution. -- Chapter 1: Outdated ideas guide cybersecurity. -- Chapter 2: States are the most dangerous actors. -- Chapter 3: Misperception and mirror imaging. -- Chapter 4: Cyber operations and interstate conflict. -- Chapter 5: Political and strategic constraints on cyber attack. -- Chapter 6: Rethinking principles for cybersecurity. -- Chapter 7: Moving to a new paradigm. -- About the author. Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Security General. bisacsh Computer security fast Electronic book. Center for Strategic and International Studies (Washington, D.C.) http://id.loc.gov/authorities/names/n86119921 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1694016 Volltext |
spellingShingle | Lewis, James Andrew, 1953- Rethinking cybersecurity : strategy, mass effect, and states / Introduction: Structuring security for the digital revolution. -- Chapter 1: Outdated ideas guide cybersecurity. -- Chapter 2: States are the most dangerous actors. -- Chapter 3: Misperception and mirror imaging. -- Chapter 4: Cyber operations and interstate conflict. -- Chapter 5: Political and strategic constraints on cyber attack. -- Chapter 6: Rethinking principles for cybersecurity. -- Chapter 7: Moving to a new paradigm. -- About the author. Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Security General. bisacsh Computer security fast |
subject_GND | https://id.nlm.nih.gov/mesh/D016494 |
title | Rethinking cybersecurity : strategy, mass effect, and states / |
title_auth | Rethinking cybersecurity : strategy, mass effect, and states / |
title_exact_search | Rethinking cybersecurity : strategy, mass effect, and states / |
title_full | Rethinking cybersecurity : strategy, mass effect, and states / author: James Andrew Lewis. |
title_fullStr | Rethinking cybersecurity : strategy, mass effect, and states / author: James Andrew Lewis. |
title_full_unstemmed | Rethinking cybersecurity : strategy, mass effect, and states / author: James Andrew Lewis. |
title_short | Rethinking cybersecurity : |
title_sort | rethinking cybersecurity strategy mass effect and states |
title_sub | strategy, mass effect, and states / |
topic | Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. COMPUTERS Security General. bisacsh Computer security fast |
topic_facet | Computer security. Computer Security Sécurité informatique. COMPUTERS Security General. Computer security Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1694016 |
work_keys_str_mv | AT lewisjamesandrew rethinkingcybersecuritystrategymasseffectandstates AT centerforstrategicandinternationalstudieswashingtondc rethinkingcybersecuritystrategymasseffectandstates |