The Locator -- [(subject = "Cyberspace")]

431 records matched your query       


Record 40 | Previous Record | MARC Display | Next Record | Search Results
Author:
Jasper, Scott, author.
Title:
Russian cyber operations : coding the boundaries of conflict / Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.).
Publisher:
Georgetown University Press,
Copyright Date:
2020
Description:
xvi, 214 pages : illustrations, maps ; 24 cm
Subject:
Cyberspace operations (Military science)--Russia (Federation)
Information warfare--Russia (Federation)
Hybrid warfare--Russia (Federation)
Asymmetric warfare--Russia (Federation)
Cyber intelligence (Computer security)--United States.
Computer security--United States.
Asymmetric warfare.
Computer security.
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Hybrid warfare.
Information warfare.
Russia (Federation)
United States.
Other Authors:
Alexander, Keith B., 1951- writer of foreword.
Notes:
Includes bibliographical references and index.
Contents:
Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion.
Summary:
"Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- Provided by publisher.
ISBN:
1626167982
9781626167988
1626167974
9781626167971
OCLC:
(OCoLC)1117311007
LCCN:
2019038780
Locations:
OVUX522 -- University of Iowa Libraries (Iowa City)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.