![Understanding Cyber-Warfare](https://img.perlego.com/book-covers/3876516/9781000839906_300_450.webp)
Understanding Cyber-Warfare
Politics, Policy and Strategy
Christopher Whyte, Brian Mazanec
- 340 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Understanding Cyber-Warfare
Politics, Policy and Strategy
Christopher Whyte, Brian Mazanec
About This Book
This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters.
Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR) and operational practice associated with computer network attack, computer network exploitation and computer network defense. However, it is conducted within complex sociopolitical settings alongside related forms of digital contestation. This book provides students with a comprehensive perspective on the technical, strategic and policy issues associated with cyber conflict, as well as an introduction to key state and non-state actors.
Specifically, the book provides a comprehensive overview of several key issue areas:
- The historical context of the emergence and evolution of cyber warfare, including the basic characteristics and methods of computer network attack, exploitation and defense
- An interdisciplinary set of theoretical perspectives on conflict in the digital age from the point of view of the fields of IR, security studies, psychology and science, technology and society (STS) studies
- Current national perspectives, policies, doctrines and strategies relevant to cyber warfare
- An examination of key challenges in international law, norm development and deterrence; and
- The role of emerging information technologies like artificial intelligence and quantum computing in shaping the dynamics of global cyber conflict
This textbook will be essential reading for students of cybersecurity/cyber conflict and information warfare, and highly recommended for students of intelligence studies, security and strategic studies, defense policy, and IR in general.
Frequently asked questions
Information
Table of contents
- Cover
- Endorsements
- Half Title
- Title
- Copyright
- Table of Contents
- List of figures
- List of tables
- List of text boxes
- List of abbreviations
- Acknowledgments
- Preface to the second edition
- 1 Introduction
- 2 The technological foundations of insecurity in the digital age
- 3 Cyberspace and international relations
- 4 Exploit: from signals intelligence to cyber warriors
- 5 Attack: from exploitation to offensive cyber operations
- 6 Shape: subvert, deceive, poison
- 7 The topology and history of major cyber conflict episodes
- 8 National experiences with cybersecurity: realization and institutional development
- 9 States at cyberwar: the dynamics and national strategies of cyber conflict
- 10 Cyber conflict as “grey zone” conflict
- 11 Non-state actors: terrorism, subversion and activism online
- 12 Norms, ethics and international law for offensive cyber operations
- 13 Evolution: how the logics of cyber conflict might change
- 14 Revolution: how the nature of cyber conflict might change
- Glossary
- Index