Description: Understanding Cybersecurity
Over the past twenty-five years cyberspace has become the newest, most useful domain of productivity the world has ever known. This stems from the sheer ubiquity of the technology and its pervasive impact on modern life. However, along with this profound capability comes extreme vulnerability exacerbated by a growing dependency on everything cyberspace has to offer. This edited volume is dedicated...
Gary Schaub (Editor)
Rowman & Littlefield International
400
Description: Understanding Cybersecurity
Years ago, when I was an instructor for the Reserve Officer Training Corps (ROTC), the first unit of instruction for rising juniors dealt with communication skills. Near the beginning of the unit, I would quote Confucius to my new students: “The rectification of names is the most important business of government. If names are not correct, language will not be in accordance with the truth of...
Gary Schaub (Editor)
Rowman & Littlefield International
2,202
Description: Understanding Cybersecurity
The debate over network protocols illustrates how standards can be politics by other means.
Gary Schaub (Editor)
Rowman & Littlefield International
9,842
Illustrations in this section
Description: Understanding Cybersecurity
The cyber domain is widely acknowledged to be in the midst of a process of global rulemaking that includes an array of public and private actors from across the globe.
Gary Schaub (Editor)
Rowman & Littlefield International
10,099
Description: Understanding Cybersecurity
The concept of “the commons” has proved quite a fruitful one for many areas of policy analysis. In the realm of strategic and military matters, the idea entered the lexicon with Mahan’s conception of the sea as “a wide common” whose control was critical for national power.1Alfred Thayer Mahan, The Influence of Sea Power Upon History: 1660–1783. Twelfth Edition (Boston, MA: Little, Brown, 1890/1918), p. 25. The idea reentered contemporary strategic discourse with historian Paul Kennedy’s emphasis on “naval mastery” as the key for British hegemony2Paul M. Kennedy, The Rise and Fall of British Naval Mastery (London: Macmillan, 1983), p. 9. and political scientist Barry Posen’s extension of the concept to the domains of outer space and...
Gary Schaub (Editor)
Rowman & Littlefield International
11,999
Description: Understanding Cybersecurity
No frontier lasts forever, and no freely occupied global commons extends endlessly where human societies are involved. Sooner or later, good fences are erected to make good neighbors, and so it must be with cyberspace. Today we are seeing the beginnings of the border-making process across the world’s nations. From the Chinese intent to create their own controlled internal Internet, to...
Gary Schaub (Editor)
Rowman & Littlefield International
13,902
Description: Understanding Cybersecurity
Strategic theorists frequently lament that military...
Gary Schaub (Editor)
Rowman & Littlefield International
7,947
Description: Understanding Cybersecurity
Identifying “revolutions in military affairs” is arbitrary, but some inflection points in technological change are larger than others: for example, the gunpowder revolution in early modern Europe, the industrial revolution of the nineteenth century, the second industrial...
Gary Schaub (Editor)
Rowman & Littlefield International
8,491
Description: Understanding Cybersecurity
U.S. national security planners have become concerned in recent years that this country might become engaged in various kinds of conflict in cyberspace. Such engagement could entail the United States as the target of hostile cyber operations, the initiator of cyber operations against adversaries, or some combination of the two.
Gary Schaub (Editor)
Rowman & Littlefield International
9,546
Description: Understanding Cybersecurity
Innovations, both technological and organizational, over the last few decades have created a potential for nonobvious warfare,1The term nonobvious had an earlier manifestation in Jeff Jonas’s data-mining product, Non-Obvious Relationship Analysis. in which the identity of the...
Gary Schaub (Editor)
Rowman & Littlefield International
5,805
Description: Understanding Cybersecurity
Technical Sergeant Joe Pesek rolled out of bed shortly after 0600 to get breakfast at the Noncommissioned Officers’ NCO club. He was assigned to the 5th Bomber Group and had arranged to meet his friends for...
Gary Schaub (Editor)
Rowman & Littlefield International
8,109
Illustrations in this section
Description: Understanding Cybersecurity
The competition between competing demands of economic growth and protecting critical cyber infrastructure (CI) has heightened the need to strengthen partnerships between the U.S. government and private industry. Developing new technologies, strategies, plans, operations, tools, and techniques is essential to protect it. How we meet this challenge has opened up an important philosophical debate in...
Gary Schaub (Editor)
Rowman & Littlefield International
10,943
Description: Understanding Cybersecurity
Gary Schaub (Editor)
Rowman & Littlefield International
9,895
Description: Understanding Cybersecurity
~5G LTE network, 6, 7, 20, 237, 244
Gary Schaub (Editor)
Rowman & Littlefield International
4,700
Description: Understanding Cybersecurity
Christopher Bronk is an assistant professor of computer and information systems and associate director of the Center for Information Security Research and Education. He holds additional appointments in Rice University’s Department of Computer Science and the University of Toronto’s Munk School of Global Affairs. He also served as a career diplomat and senior advisor at the U.S....
Gary Schaub (Editor)
Rowman & Littlefield International
1,316