
Understanding Cyber Warfare
Politics, Policy and Strategy
- 296 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
This textbook offers an accessible introduction to the historical, technical, and strategic context of cyber conflict.
The international relations, policy, doctrine, strategy, and operational issues associated with computer network attack, computer network exploitation, and computer network defense are collectively referred to as cyber warfare. This new textbook provides students with a comprehensive perspective on the technical, strategic, and policy issues associated with cyber conflict as well as an introduction to key state and non-state actors.
Specifically, the book provides a comprehensive overview of these key issue areas:
- the historical emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation, and defense;
-
- a theoretical set of perspectives on conflict in the digital age from the point of view of international relations (IR) and the security studies field;
-
- the current national perspectives, policies, doctrines, and strategies relevant to cyber warfare; and
-
- an examination of key challenges in international law, norm development, and the potential impact of cyber warfare on future international conflicts.
-
This book will be of much interest to students of cyber conflict and other forms of digital warfare, security studies, strategic studies, defense policy, and, most broadly, international relations.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Half Title
- Praise
- Title Page
- Copyright Page
- Table of Contents
- List of Illustrations
- Acknowledgements
- List of Abbreviations
- 1 Introduction
- 2 The Technological Foundations of Insecurity in the Digital Age
- 3 Cyberspace and International Relations
- 4 Exploitation: From Signals Intelligence to Cyber Warriors
- 5 Attack: From Exploitation to offensive Cyber Operations
- 6 A Brief History of Major Cyber Conflict Episodes
- 7 States at Cyberwar: The Dynamics of Interstate Cyber Interactions
- 8 Cyber Conflict as “Not War”
- 9 Non-State Actors: Terrorism, Subversion, and Activism Online
- 10 National Experiences with Cyber-Security: Realization and Institutional Development
- 11 Norms, Ethics, and International Law for Offensive Cyber Operations
- 12 The Future of Cyber Conflict
- Glossary
- Index