
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking—principally the Internet—are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title
- Copyright
- Contents
- Acknowledgments
- Timeline of Major Cyber Security Events, 2005–2015
- 1. A New Great Game
- 2. Checking Facebook on an iPhone
- 3. Tunis, Room 641A, and the Politics of the Information Society
- 4. The Great Cyberwar of 2007
- 5. Securing Cyberspace in the Homeland
- 6. A Commission, a Review, but Little Policy
- 7. Hard Cyber Power, from Stuxnet to Shamoon
- 8. Diplomacy, Social Software, and the Arab Spring
- 9. Espionage, Radical Transparency, and National Security
- 10. Snowden
- 11. Cybercrime and Punishment
- 12. Virtual Policy in the Real World
- Notes
- Bibliography
- Index
- About the Editors and Contributors