Cybersecurity
eBook - ePub

Cybersecurity

Politics, Governance and Conflict in Cyberspace

Damien Van Puyvelde, Aaron F. Brantly

Share book
  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Cybersecurity

Politics, Governance and Conflict in Cyberspace

Damien Van Puyvelde, Aaron F. Brantly

Book details
Book preview
Table of contents
Citations

About This Book

In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. But should we believe the prophets of cyber war or worry about online government surveillance? Are such security concerns real, exaggerated or just poorly understood?

In this comprehensive text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril.

Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies – from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate – to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures. With questions for group discussion and suggestions for further reading throughout, Cybersecurity will be essential reading for anyone interested in understanding the challenges and opportunities presented by the continued expansion of cyberspace.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Cybersecurity an online PDF/ePUB?
Yes, you can access Cybersecurity by Damien Van Puyvelde, Aaron F. Brantly in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & Intelligence & Espionage. We have over one million books available in our catalogue for you to explore.

1
The expanding scope of cybersecurity

This chapter explores the history of cyberspace and related security concerns, from the creation of computers to the present day. The development of computers has been spurred on by human innovation, from mechanical tabulators to digital machines linked together in networks. Security concerns have played a central role in this history. The governments of the United States and the United Kingdom funded early research into computers during the Second World War to improve anti-aircraft defense and codebreaking. In the aftermath of the Second World War, the US Department of Defense (DoD) sponsored much of the early research into computing and the development of computer networks to advance US capabilities and power. This stream of government funding has allowed scientists, in government, academia and the industry, to develop computers and networking as a collaborative tool to share resources and information. Openness and transparency – two values that are essential to the scientific process – guided their work, and helped to shape the early development of what would become the Internet.
Growing access to computers spurred on a number of online communities, allowing humans to express themselves and interact in a new domain: cyberspace. Human activities such as commerce and entertainment, but also espionage and theft, found new expressions online. The 1990s witnessed a rise of cyber threats affecting all levels of society and government. Cyberspace became a cause of concern for governments who feared that the sensitive data they kept on computers could be stolen, manipulated and potentially weaponized, to damage national defense, the economy or even the social fabric of society. As human reliance on computers has expanded, cyberspace has provided new opportunities to exert power, and to threaten the domestic and international order.
Today, cyberspace is a complex socio-technical-economic environment embraced by 3 billion individuals, and millions of groups and communities. All these actors benefit from the opportunities, facilitated by cyberspace, to share resources and information. Yet digital networks host an ever-growing number of cyber threats, which can disrupt human activities, in the digital and physical world. Cyberspace is now a global security issue that transcends national, social and cultural boundaries. As a result, cybersecurity has begun to emerge as an important issue in the field of International Relations, where researchers and practitioners are only now starting to consider the nature of cyber threats, and the most appropriate frameworks for mitigating them.

A brief history of the computer

The history of the computer can be traced back to nineteenth-century England, when mathematics professor Charles Babbage designed his analytical engine. Machines like the analytical engine relied on mechanical components such as levers and gears to compute complex calculations. What distinguished Babbage’s machine from others – at least on paper, since his engine never came close to being built – was that it was programmable. While machines could only perform a single function, computers like Babbage’s could be programmed to perform multiple functions.1 New applications for mechanical computers emerged in the following decades. American inventor Herman Hollerith developed a method of storing information as holes punched into cards. His machine was used to tabulate the 1890 US census.2 The US military developed mechanical computers to improve the use of bombsights on military aircraft in the 1930s. An aimer would input parameters such as speed, altitude and direction, and the bombsight calculated the point at which to aim.3 Human “computers” continued to direct the “program” for these machines. This dependence on humans limited the speed at which mechanical computers could support their activities.
The first generation of electronic computers emerged in the 1930s. This new technology used electric relays and switches to make calculations. The Atanasoff–Berry Computer (ABC), created by physics professor John Vincent Atanasoff and his graduate assistant Clifford Berry, is often considered to be the first electronic digital computer. The ABC was designed to solve systems of linear equations using binary numbers. The first prototype of the ABC was built in 1939, with the final rendition weighing more than 700 pounds. The advent of the Second World War oriented research into electronic computers. In the United States, researchers working at the Bell Laboratories developed an anti-aircraft gun director, the M-9, that could direct itself without human interaction using data fed by radar tracking. On the other side of the Atlantic, British codebreakers built another set of electronic computers, called the Colossus, to decode text generated by the Lorenz cipher, which was used by the German army to protect high-level messages. The use of these computers was characterized by a high level of secrecy, which limited any subsequent transfer of knowledge to the research and commercial sectors.4 Storybox 1.1 presents a brief history of the ENIAC (figure 1.1), one of the first electronic general-purpose computers ever made, which is sometimes presented as the prototype from which most modern computers evolved.

Storybox 1.1 The ENIAC

In the aftermath of the Second World War, the US government and a group of researchers at the University of Pennsylvania completed the Electronic Numerator, Integrator, Analyzer and Computer (ENIAC). Unlike the ABC or Colossus, the ENIAC ran calculations at electronic speed, without being slowed by any mechanical parts. The ENIAC was also the first general-purpose computer, able to solve a large set of numerical problems through re-programming. Despite its versatility, this new computer was primarily used to calculate artillery firing tables, taking over the work of hundreds of humans working on missile tables.5 The development of the ENIAC inspired a number of similar projects seeking to develop programmable computers that could store information.6
image
Figure 1.1 ENIAC, c.1946 (University of Pennsylvania Archives)
The next generation of computers emerged in 1947 and was characterized by the use of transistors, which increased their reliability.7 This second generation was the first to be used for commercial purposes, leading, most notably, to the success of International Business Machines (IBM), a company aiming to produce computers for all. By the end of the 1950s, dozen of companies contributed to an emerging computer industry in the United States and the United Kingdom, but also in continental Europe and Japan. The development of general-purpose computers required programs to give them functionality. The development of computer programming languages (to facilitate the tasking of computers) and operating systems (to manage the flow of work of a computer), throughout the 1950s, eventually led to the distinction between hardware and software.8 The US DoD maintained an essential role, sponsoring specific computer languages and operating systems, and indirectly driving the industry.9 Computers remained extremely expensive, which limited the market for them and, by extension, their uses. By 1962, there were around 10,000 computers worldwide, most of them located in the United States.
The invention of the integrated circuit allowed for the development of a third generation of computers. The minicomputers that arose in the mid-1960s were smaller, more powerful and more reliable. A new digital (r)evolution was taking place. Computers moved from being a government machine, to an esoteric hobby and then, finally, to a household item. A number of inventions facilitated this evolution. Human–c...

Table of contents