The Evolution of Cyber War: International Norms for Emerging-Technology Weapons
by
Former secretary of defense Leon Panetta once described cyber warfare as "the most serious threat in the twenty-first century," capable of destroying our entire infrastructure and crippling the nation. Already, major cyber attacks have affected countries around the world: Estonia in 2007, Georgia in 2008, Iran in 2010, and most recently the United States. As with other methods of war, cyber technology can be used not only against military forces and facilities but also against civilian targets. Information technology has enabled a new method of warfare that is proving extremely difficult to combat, let alone defeat. And yet cyber warfare is still in its infancy, with innumerable possibilities and contingencies for how such conflicts may play out in the coming decades. Brian M. Mazanec examines the worldwide development of constraining norms for cyber war and predicts how those norms will unfold in the future. Employing case studies of other emerging-technology weapons--chemical and biological, strategic bombing, and nuclear weaponry--Mazanec expands previous understandings of norm-evolution theory, offering recommendations for U.S. policymakers and citizens alike as they grapple with the reality of cyber terrorism in our own backyard.
Black Code: Surveillance, Privacy, and the Dark Side of the Internet
by
Drawing on the first-hand experiences of one of the most important protagonists in the battle - the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks worldwide - Black Code takes readers on a fascinating journey into the battle. Thought-provoking, compelling and sometimes frightening, it is a wake-up call to those who have come to take the Internet for granted. Cyberspace is ours and is what we make of it, Deibert argues.
Computer Network Security and Cyber Ethics
by
In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions of morality and ethics. The reader will gain an understanding of how the security of information in general and of computer networks in particular, on which our national critical infrastructure and, indeed, our lives depend, is based squarely on the individuals who build the hardware and design and develop the software that run the networks that store our vital information. Addressing security issues with ever-growing social networks are two new chapters: Security of Mobile Systems and Security in the Cloud Infrastructure. Instructors considering this book for use in a course may request an examination copy here.
Official websites and organizations:
= .gov website