Cyberdeterrence and cyberwar

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but th...

Full description

Bibliographic Details
Main Author: Libicki, Martin C.
Format: eBook
Language:English
Published: Santa Monica, CA RAND 2009, 2009
Series:RAND Corporation monograph series
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
LEADER 02286nam a2200457 u 4500
001 EB001842517
003 EBX01000000000000001006506
005 00000000000000.0
007 tu|||||||||||||||||||||
008 180730 r ||| eng
020 |z 9780833047342 
020 |a 9780833047342 
020 |a 9781282398535 
020 |a 9786612398537 
020 |a 1282398539 
020 |a 6612398531 
020 |z 0833047345 
020 |a 0833047345 
050 4 |a U163 
100 1 |a Libicki, Martin C. 
245 0 0 |a Cyberdeterrence and cyberwar  |h Elektronische Ressource  |c Martin C. Libicki 
260 |a Santa Monica, CA  |b RAND  |c 2009, 2009 
300 |a xxiv, 214 pages  |b illustrations 
505 0 |a Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control 
505 0 |a Includes bibliographical references (pages 225-214) 
651 4 |a United States / fast 
653 |a TECHNOLOGY / Military Science 
653 |a COMPUTERS / Security / General 
653 |a Civil defense / United States 
653 |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism 
653 |a Cyberspace / Security measures 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ZDB-39-JOA  |a JSTOR Open Access Books 
490 0 |a RAND Corporation monograph series 
024 8 |a RAND/MG-877-AF 
773 0 |t Books at JSTOR: Open Access 
776 |z 9780833048752 
776 |z 0833048759 
856 4 0 |u https://www.jstor.org/stable/10.7249/mg877af  |x Verlag  |3 Volltext 
082 0 |a 355.3/43 
520 |a Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack