Learn and Grow | Author Interviews | Book Summaries | Book lists | Summaries | Author Interviews | Shop Nonfiction books | Booklists | Non-fiction books | Book Reviews | Best Business Books | Best Management Books | Best Leadership Books | Best Business Strategy Books | Best Finance Books | Best Investment Books | Best History Books | Best World History Books | Best China History Books | Best India History Books | Best British India Books | Best American History Books | Best Science Books | Best Technology Books | Best Slavery Books | Best Economics Books | Best Macroeconomics Books | Best Health Books | Best Medicine History Books | Best Travel Books | Book Events | Author Events | Virtual Book Launch | Latest nonfiction books | Upcoming nonfiction books | Best University Presses | Harvard University Press | Yale University Press | Stanford University Press | Columbia University Press | Oxford University Press | Cambridge University Press | Chicago University Press | Pulitzer Prize | Recommended Books | Readara Book Experts | Readara Booklists | Readara Book summaries | Best Author Interviews | Best Nobel Prize Winners Books | Connect with Book Editors | Book Designers | Book Printers | Book Cover Designers | Best Book Agents List | Book PR and Marketing Agencies List | Book Wholesalers List Nonfiction books | Booklists | Non-fiction books | Book Reviews | Best Business Books | Best Management Books | Best Leadership Books | Best Business Strategy Books | Best Finance Books | Best Investment Books | Best History Books | Best World History Books | Best China History Books | Best India History Books | Best British India Books | Best American History Books | Best Science Books | Best Technology Books | Best Slavery Books | Best Economics Books | Best Macroeconomics Books | Best Health Books | Best Medicine History Books | Best Travel Books | Book Events | Author Events | Virtual Book Launch | Latest nonfiction books | Upcoming nonfiction books | Best University Presses | Harvard University Press | Yale University Press | Stanford University Press | Columbia University Press | Oxford University Press | Cambridge University Press | Chicago University Press | Pulitzer Prize | Recommended Books | Readara Book Experts | Readara Booklists | Readara Book summaries | Best Author Interviews | Best Nobel Prize Winners Books | Connect with Book Editors | Book Designers | Book Printers | Book Cover Designers | Best Book Agents List | Book PR and Marketing Agencies List | Book Wholesalers List | Book lists, Summaries, Author Interviews, Shop

Expedite your nonfiction book discovery process with Readara interviews, summaries and recommendations, Broaden your knowledge and gain insights from leading experts and scholars

In-depth, hour-long interviews with notable nonfiction authors, Gain new perspectives and ideas from the writer’s expertise and research, Valuable resource for readers and researchers

Optimize your book discovery process, Four-to eight-page summaries prepared by subject matter experts, Quickly review the book’s central messages and range of content

Books are handpicked covering a wide range of important categories and topics, Selected authors are subject experts, field professionals, or distinguished academics

Our editorial team includes books offering insights, unique views and researched-narratives in categories, Trade shows and book fairs, Book signings and in person author talks,Webinars and online events

Connect with editors and designers,Discover PR & marketing services providers, Source printers and related service providers

Cyber Defense: Securing Military Systems and Critical Civilian Infrastructure from an Electronic 9/11

Cyber Defense: Securing Military Systems and Critical Civilian Infrastructure from an Electronic 9/11

0Arrow Icon
Rate this book Arrow Icon

Key Metrics

  • Sidney E Dean Editor
  • Createspace Independent Publishing Platform
  • Paperback
  • 9781490560403
  • 10 X 7.99 X 0.19 inches
  • 0.43 pounds
  • Political Science > Intelligence & Espionage
  • English
$0
List Price:
$0
Save:
$0 ($%)
Format:
Paperback
Shipping
$4
Ships from:
-
Estimated Arrival:
-
Available Copies:
0 Copies
Ready To Buy:
Back Order
Secure Icon Secure Transaction
Sold By:
Readara.com
Add to My Wishlist

Book Description

The recent focus on Edward Snowdon and revelations of US and British surveillance programs should not distract from one vital fact. The electronic networks on which western societies now depend are under constant malicious attack, trend growing. Whether military command and control or critical infrastructure grids (think power, water, transportation, financial, even agriculture and health care), state and non-state actors are consistently working to infiltrate, copy data, and/or position themselves for electronic sabotage in case conflict breaks out. A November 2011 study released by the US government's Office of the National Counterintelligence Executive publicly identifies China and Russia as the most aggressive collectors of economic and technological information from hacked US computer systems [Foreign Economic Collection 2011]. This year it became known that hackers presumed to be working for Chinese military intelligence accessed databases containing technical details of dozens of American high tech weapon systems, both operational and developmental. This immediately led to speculation whether the Chinese or other opponents could temporarily hijack control over these weapon systems in a future conflict. The information concerning the weapon systems hack was leaked from a January 2013 Defense Science Board report titled Resilient Military Systems and the Advanced Cyber Threat. This report, compiled by respected civilian scientists and policy experts, concludes that a full spectrum cyber campaign waged by a state actor with sophisticated capabilities is of such magnitude and sophistication that it cannot be defended against. The report therefore recommends that a successful (Department of Defense) cyber strategy must include a deterrence component. Some commentators have read this as a call for nuclear response to cyber attacks. While such a Strangelovesque recommendation is not actually contained in the report (at least not explicitly) the DSB's experts do emphasize the need to ensure the survivability of American nuclear systems from the effects of enemy cyber operations. Failure to harden military and critical civilian systems could leave the United States and its NATO allies vulnerable to an electronic 9/11 or even an electronic Pearl Harbor. Efforts must be made (and expenses incurred) to keep the alliance and its members from having to choose between launching preemptive kinetic warfare or risk being functionally disarmed by enemy information warfare. This issue of Hampton Roads International Security Quarterly begins with an introduction to the theme of cybersecurity and some general recommendations regarding policies and responses. We then progress to the foreign threat scenarios, followed by discussion of cybersecurity for the United States national critical infrastructure. In the final section of this issue, US government cybersecurity functions and instruments (civilian and military) are outlined, rounded out by a discussion of cybersecurity at the NATO level. As always, we wish you interesting reading.
Cyber Defense: Securing Military Systems and Critical Civilian Infrastructure from an Electronic 9/11

Videos

No Videos

Community reviews

Write a Review

No Community reviews