Cybersecurity
eBook - ePub

Cybersecurity

Politics, Governance and Conflict in Cyberspace

Damien Van Puyvelde, Aaron F. Brantly

Buch teilen
  1. English
  2. ePUB (handyfreundlich)
  3. Über iOS und Android verfügbar
eBook - ePub

Cybersecurity

Politics, Governance and Conflict in Cyberspace

Damien Van Puyvelde, Aaron F. Brantly

Angaben zum Buch
Buchvorschau
Inhaltsverzeichnis
Quellenangaben

Über dieses Buch

In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. But should we believe the prophets of cyber war or worry about online government surveillance? Are such security concerns real, exaggerated or just poorly understood?

In this comprehensive text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril.

Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies – from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate – to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures. With questions for group discussion and suggestions for further reading throughout, Cybersecurity will be essential reading for anyone interested in understanding the challenges and opportunities presented by the continued expansion of cyberspace.

Häufig gestellte Fragen

Wie kann ich mein Abo kündigen?
Gehe einfach zum Kontobereich in den Einstellungen und klicke auf „Abo kündigen“ – ganz einfach. Nachdem du gekündigt hast, bleibt deine Mitgliedschaft für den verbleibenden Abozeitraum, den du bereits bezahlt hast, aktiv. Mehr Informationen hier.
(Wie) Kann ich Bücher herunterladen?
Derzeit stehen all unsere auf Mobilgeräte reagierenden ePub-Bücher zum Download über die App zur Verfügung. Die meisten unserer PDFs stehen ebenfalls zum Download bereit; wir arbeiten daran, auch die übrigen PDFs zum Download anzubieten, bei denen dies aktuell noch nicht möglich ist. Weitere Informationen hier.
Welcher Unterschied besteht bei den Preisen zwischen den Aboplänen?
Mit beiden Aboplänen erhältst du vollen Zugang zur Bibliothek und allen Funktionen von Perlego. Die einzigen Unterschiede bestehen im Preis und dem Abozeitraum: Mit dem Jahresabo sparst du auf 12 Monate gerechnet im Vergleich zum Monatsabo rund 30 %.
Was ist Perlego?
Wir sind ein Online-Abodienst für Lehrbücher, bei dem du für weniger als den Preis eines einzelnen Buches pro Monat Zugang zu einer ganzen Online-Bibliothek erhältst. Mit über 1 Million Büchern zu über 1.000 verschiedenen Themen haben wir bestimmt alles, was du brauchst! Weitere Informationen hier.
Unterstützt Perlego Text-zu-Sprache?
Achte auf das Symbol zum Vorlesen in deinem nächsten Buch, um zu sehen, ob du es dir auch anhören kannst. Bei diesem Tool wird dir Text laut vorgelesen, wobei der Text beim Vorlesen auch grafisch hervorgehoben wird. Du kannst das Vorlesen jederzeit anhalten, beschleunigen und verlangsamen. Weitere Informationen hier.
Ist Cybersecurity als Online-PDF/ePub verfügbar?
Ja, du hast Zugang zu Cybersecurity von Damien Van Puyvelde, Aaron F. Brantly im PDF- und/oder ePub-Format sowie zu anderen beliebten Büchern aus Politics & International Relations & Intelligence & Espionage. Aus unserem Katalog stehen dir über 1 Million Bücher zur Verfügung.

Information

1
The expanding scope of cybersecurity

This chapter explores the history of cyberspace and related security concerns, from the creation of computers to the present day. The development of computers has been spurred on by human innovation, from mechanical tabulators to digital machines linked together in networks. Security concerns have played a central role in this history. The governments of the United States and the United Kingdom funded early research into computers during the Second World War to improve anti-aircraft defense and codebreaking. In the aftermath of the Second World War, the US Department of Defense (DoD) sponsored much of the early research into computing and the development of computer networks to advance US capabilities and power. This stream of government funding has allowed scientists, in government, academia and the industry, to develop computers and networking as a collaborative tool to share resources and information. Openness and transparency – two values that are essential to the scientific process – guided their work, and helped to shape the early development of what would become the Internet.
Growing access to computers spurred on a number of online communities, allowing humans to express themselves and interact in a new domain: cyberspace. Human activities such as commerce and entertainment, but also espionage and theft, found new expressions online. The 1990s witnessed a rise of cyber threats affecting all levels of society and government. Cyberspace became a cause of concern for governments who feared that the sensitive data they kept on computers could be stolen, manipulated and potentially weaponized, to damage national defense, the economy or even the social fabric of society. As human reliance on computers has expanded, cyberspace has provided new opportunities to exert power, and to threaten the domestic and international order.
Today, cyberspace is a complex socio-technical-economic environment embraced by 3 billion individuals, and millions of groups and communities. All these actors benefit from the opportunities, facilitated by cyberspace, to share resources and information. Yet digital networks host an ever-growing number of cyber threats, which can disrupt human activities, in the digital and physical world. Cyberspace is now a global security issue that transcends national, social and cultural boundaries. As a result, cybersecurity has begun to emerge as an important issue in the field of International Relations, where researchers and practitioners are only now starting to consider the nature of cyber threats, and the most appropriate frameworks for mitigating them.

A brief history of the computer

The history of the computer can be traced back to nineteenth-century England, when mathematics professor Charles Babbage designed his analytical engine. Machines like the analytical engine relied on mechanical components such as levers and gears to compute complex calculations. What distinguished Babbage’s machine from others – at least on paper, since his engine never came close to being built – was that it was programmable. While machines could only perform a single function, computers like Babbage’s could be programmed to perform multiple functions.1 New applications for mechanical computers emerged in the following decades. American inventor Herman Hollerith developed a method of storing information as holes punched into cards. His machine was used to tabulate the 1890 US census.2 The US military developed mechanical computers to improve the use of bombsights on military aircraft in the 1930s. An aimer would input parameters such as speed, altitude and direction, and the bombsight calculated the point at which to aim.3 Human “computers” continued to direct the “program” for these machines. This dependence on humans limited the speed at which mechanical computers could support their activities.
The first generation of electronic computers emerged in the 1930s. This new technology used electric relays and switches to make calculations. The Atanasoff–Berry Computer (ABC), created by physics professor John Vincent Atanasoff and his graduate assistant Clifford Berry, is often considered to be the first electronic digital computer. The ABC was designed to solve systems of linear equations using binary numbers. The first prototype of the ABC was built in 1939, with the final rendition weighing more than 700 pounds. The advent of the Second World War oriented research into electronic computers. In the United States, researchers working at the Bell Laboratories developed an anti-aircraft gun director, the M-9, that could direct itself without human interaction using data fed by radar tracking. On the other side of the Atlantic, British codebreakers built another set of electronic computers, called the Colossus, to decode text generated by the Lorenz cipher, which was used by the German army to protect high-level messages. The use of these computers was characterized by a high level of secrecy, which limited any subsequent transfer of knowledge to the research and commercial sectors.4 Storybox 1.1 presents a brief history of the ENIAC (figure 1.1), one of the first electronic general-purpose computers ever made, which is sometimes presented as the prototype from which most modern computers evolved.

Storybox 1.1 The ENIAC

In the aftermath of the Second World War, the US government and a group of researchers at the University of Pennsylvania completed the Electronic Numerator, Integrator, Analyzer and Computer (ENIAC). Unlike the ABC or Colossus, the ENIAC ran calculations at electronic speed, without being slowed by any mechanical parts. The ENIAC was also the first general-purpose computer, able to solve a large set of numerical problems through re-programming. Despite its versatility, this new computer was primarily used to calculate artillery firing tables, taking over the work of hundreds of humans working on missile tables.5 The development of the ENIAC inspired a number of similar projects seeking to develop programmable computers that could store information.6
image
Figure 1.1 ENIAC, c.1946 (University of Pennsylvania Archives)
The next generation of computers emerged in 1947 and was characterized by the use of transistors, which increased their reliability.7 This second generation was the first to be used for commercial purposes, leading, most notably, to the success of International Business Machines (IBM), a company aiming to produce computers for all. By the end of the 1950s, dozen of companies contributed to an emerging computer industry in the United States and the United Kingdom, but also in continental Europe and Japan. The development of general-purpose computers required programs to give them functionality. The development of computer programming languages (to facilitate the tasking of computers) and operating systems (to manage the flow of work of a computer), throughout the 1950s, eventually led to the distinction between hardware and software.8 The US DoD maintained an essential role, sponsoring specific computer languages and operating systems, and indirectly driving the industry.9 Computers remained extremely expensive, which limited the market for them and, by extension, their uses. By 1962, there were around 10,000 computers worldwide, most of them located in the United States.
The invention of the integrated circuit allowed for the development of a third generation of computers. The minicomputers that arose in the mid-1960s were smaller, more powerful and more reliable. A new digital (r)evolution was taking place. Computers moved from being a government machine, to an esoteric hobby and then, finally, to a household item. A number of inventions facilitated this evolution. Human–c...

Inhaltsverzeichnis