Staff View for: Managing Cyber Attacks in International

 Staff view

You must be logged in to Tag Records

Managing Cyber Attacks in International Law, Business, and Relations : In Search of Cyber Peace.

Book Cover
Main Author: Shackelford, Scott J.
Published: New York : Cambridge University Press, 2014.
Topics: Computer crimes. | Computer networks -- Security measures. | Cyberspace -- Security measures. | Cyberterrorism. | Information warfare (International law).
Genres: Electronic books.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 08633cam a22005053i 4500
001 14786065
005 20180620194544.0
006 m o d |
007 cr cnu||||||||
008 140930s2014 xx o ||||0 eng d
020 |a9781107347656|q(electronic bk.)
020 |z9781107004375
035 |a(MiAaPQ)EBC1139663
035 |a(Au-PeEL)EBL1139663
035 |a(CaPaEBR)ebr10888057
035 |a(CaONFJC)MIL637857
035 |a(OCoLC)ocn881886638
035 |a(DPUdb)1149966
040 |aMiAaPQ|beng|erda|epn|cMiAaPQ|dMiAaPQ|dDPUdb
050 4|aKZ6718 .S53 2013
082 0 |a343.0999
100 1 |aShackelford, Scott J.
245 10|aManaging Cyber Attacks in International Law, Business, and Relations :|bIn Search of Cyber Peace.
264 1|aNew York :|bCambridge University Press,|c2014.
264 4|c©2014.
300 |a1 online resource (436 pages)
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
505 0 |aCover -- Half title -- Title -- Copyright -- Dedication -- Epigraph -- Contents -- Tables and Figures -- Foreword -- Preface -- Cyber War and Peace -- Key Terms -- Acknowledgments -- Abbreviations -- Part I Foundations of Polycentric Governance in Cyberspace -- 1 Defining the Cyber Threat in Internet Governance -- Understanding the Cyber Threat -- Cyber War -- Cyber Espionage -- Cybercrime -- Cyber Terrorism -- Summary -- Fractured Internet Governance and Its Security Implications -- The Unplanned, Well-Planned Internet -- Institutionalized Governance: ICANN and the Precarious Root -- The Early Internet's Address System and the Man Who Could Have Erased It -- DNS Wars: The U.S. Government Strikes Back -- ICANN and the Cyber Regime Complex -- ICANN: Walking the Virtual Tightrope -- Bottom-Up Governance and the Informal IETF -- "Code is Law" -- The Digital World is Flat: Self-Organization through the IETF -- Networked, Flat, and Crowded: The Evolution of Internet Governance -- Summary -- 2 Who Controls Cyberspace? Analyzing Cyber Regulation through Polycentric Governance -- What Is Cyberspace? -- Introducing the Global Commons -- The Cyber Pseudo Commons -- Tragedy of the Cyber Pseudo Commons -- National Regulation in Cyberspace -- The Origins and Purpose of Cyber Censorship -- Types of Content Filtering -- National Approaches to Censorship -- Internet Sovereignty? An Internet with Chinese Characteristics -- Internet Freedom? U.S. Cyber Censorship -- The Cost and Future of Internet Censorship -- The Role of the Private Sector in Managing Cyberspace -- Sovereignty in the Cyber Pseudo Commons -- Option 1: Regulating Cyberspace through the Effects Doctrine -- Option 2: Regulating Cyberspace through the CHM Concept -- Polycentric Regulation in Cyberspace: A Framework for Analyzing Cybersecurity Challenges -- Regulatory Approaches in Cyberspace.
505 8 |aPolycentric Institutional Analysis and Climate Change -- Introducing Polycentric Governance -- Applying Polycentric Governance to Cybersecurity -- Defined Boundaries -- Proportionality -- Collective-Choice Arrangements and Minimal Recognition of Rights -- Monitoring -- Graduated Sanctions and Dispute Resolution -- Nested Enterprises -- Polycentricity and Cybersecurity -- Summary -- Part II Managing Vulnerabilities -- 3 Hacking the Planet, the Dalai Lama, and You -- Regulating through Network Architecture to Enhance Cybersecurity -- Securing the Internet's Physical Infrastructure -- Managing Vulnerabilities in the Logical Infrastructure -- TCP/IP -- DNS -- BGP -- Protocol Fixes -- IPsec -- DNSSEC -- Securing TCP and BGP -- Debugging and Regulating through Code -- The Threat of Social Engineering to the Content Layer -- Summary -- Cybersecurity 101: Understanding the Weapons -- Spyware -- Trojan Horses -- Viruses -- Worms -- Logic Bombs -- DDoS Attacks -- Zero-Day Exploits -- Summary -- Cybersecurity 102: Using the Weapons -- From the Foothills of the Himalayas to the Frontiers of Cyberspace: Cyber Weapons, States, and the Problem of Attribution -- Understanding the Cyber Threat Ecosystem within a Polycentric Framework -- 4 The New Cyber Warfare -- Defining the New Cyber Warfare -- A Short History of Cyber Conflict -- The Opening Cyber Salvos -- Web War I? The Cyber Attacks on Estonia -- Timeline of the Cyber Attacks on Estonia -- Determining Responsibility for the Cyber Attack on Estonia -- The Reaction of the United States to the Cyber Attacks on Estonia -- Cyber Deterrence -- The Use of Cyber Attacks in the 2008 Invasion of Georgia -- Stuxnet: The Cyber Shot Heard around the World -- Summary -- National Cybersecurity Strategies of the Cyber Powers -- United States -- United Kingdom -- China -- Russia -- Israel.
505 8 |aRegional Cyber Defense: NATO Cybersecurity -- A Polycentric Approach to Securing Critical National Infrastructure -- 5 Risky Business -- Defining the Cyber Threat to the Private Sector -- The Trouble with Data -- Analyzing the Cyber Threat to the Private Sector -- How Often Do Cyber Attacks Affect the Private Sector? -- Which Industries are Being Targeted? -- Which Types of Attacks Occur Most Frequently? -- How Much Do Cyber Attacks Cost? -- Managing Uncertainty in the Cyber Threat Matrix -- Enhancing Cybersecurity through the Competitive Market -- Managing the Cyber Threat at Microsoft -- Cyber Insecurity: Proactive and Reactive Cybersecurity Strategies -- Technological and Budgetary Cybersecurity Best Practices -- Organizational Cybersecurity Best Practices: People and Processes -- Challenges to Corporate Cybersecurity -- Managing Market Imperfections through Market-Based Incentives and Regulatory Intervention -- Regulatory Intervention to Manage Cyber Attacks -- Cyber Risk Mitigation: Analyzing the Role of Cyber Risk Insurance in Enhancing Cybersecurity -- Public-Private Partnerships for Cybersecurity -- Summary -- Part III The Law, Politics, and Promise of Cyber Peace -- 6 An Introduction to the Law of Cyber War and Peace -- The Law of Cyber Peace -- A Brief Introduction to International Law -- Regulating Cyber Weapons through International Law -- Interwar Arms Control -- The Analogy of Nuclear War -- From the Digital Frontier to the Final Frontier: Arms Limitation in Space Law as an Analogy for Cyber War -- Freeze the Code: The Antarctic Treaty System Approach to Cyber Weapons -- Determining Liability for Cyber Attacks through International Communications and U.S. Cyber Law -- International Communications Law and Cyber Attacks -- U.S. Cyber Law Applied to Cyber Attacks.
505 8 |aThe Role of the Private Sector in Managing Cyber Attacks under International Law -- Analogizing Other Applicable Accords to Cyber Attacks -- Summary -- The Law of Cyber War -- State Responsibility for Cyber Attacks -- Cyber Attacks and Self-Defense -- The Intersections of International Humanitarian and Human Rights Law as Applied to Cybersecurity -- Applying the LOAC to Cyber Attacks -- Cyber Warfare, International Criminal Law, and Human Rights Law -- Summary -- 7 Cyber Peace -- Cyber Power and Politics in the Information Age -- Tweet Softly, but Carry a Big Stick: U.S. Cybersecurity Reform Efforts -- The Global Politics of Internet Reform -- The Future of Internet Governance -- The Rise of Polycentric Governance in Cyberspace -- Regime Effectiveness in Cyberspace -- Cybersecurity Best Practices -- Personal Cybersecurity -- Technical Cybersecurity -- Corporate Cybersecurity -- National Cybersecurity -- Toward Cyber Peace -- Conclusion -- Appendix -- Index.
520 |aThis book presents a novel framework to reconceptualize internet governance and better manage cyber attacks.
588 |aDescription based on publisher supplied metadata and other sources.
590 |aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 0|aComputer crimes.
650 0|aComputer networks -- Security measures.
650 0|aCyberspace -- Security measures.
650 0|aCyberterrorism.
650 0|aInformation warfare (International law).
655 4|aElectronic books.
776 08|iPrint version:|aShackelford, Scott J.|tManaging Cyber Attacks in International Law, Business, and Relations : In Search of Cyber Peace|dNew York : Cambridge University Press,c2014|z9781107004375
797 2 |aProQuest (Firm)
856 40|uhttp://ezproxy.depaul.edu/login?url=https://ebookcentral.proquest.com/lib/depaullaw/detail.action?docID=1139663|zOnline access for DePaul users only.

Staff View for: Managing Cyber Attacks in International