|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
ocn973188302 |
003 |
OCoLC |
005 |
20240623213015.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
170218s2017 enk ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d OCLCF
|d STBDS
|d FIE
|d OCLCQ
|d OCLCA
|d MERUC
|d OCLCQ
|d LVT
|d OCLCQ
|d UKAHL
|d OCLCQ
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 973752818
|a 973795613
|a 973833746
|a 974453444
|
020 |
|
|
|a 9780190694692
|
020 |
|
|
|a 0190694696
|
020 |
|
|
|z 1849047138
|
020 |
|
|
|z 9781849047135
|
035 |
|
|
|a (OCoLC)973188302
|z (OCoLC)973752818
|z (OCoLC)973795613
|z (OCoLC)973833746
|z (OCoLC)974453444
|
050 |
|
4 |
|a TK5105.59
|b .B83 2016
|
049 |
|
|
|a HCDD
|
100 |
1 |
|
|a Buchanan, Ben.
|
245 |
1 |
4 |
|a The Cybersecurity Dilemma :
|b Hacking, Trust and Fear Between Nations.
|
260 |
|
|
|a Oxford :
|b Oxford University Press,
|c 2017.
|
300 |
|
|
|a 1 online resource (300 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Half-title; Title; Copyright; Contents; List of Acronyms; Introduction; The Approach; Definitions and Limitations; 1. The Security Dilemma; Overview; International Relations, Anarchy, and the Security Dilemma; The Security Dilemma and Intelligence; Conclusion: The Stakes of the Security Dilemma; 2. The Intruder's View; Overview; An Intrusion Model; How Operational Incentives Drive the Cybersecurity Dilemma; Conclusion: The First Pillar of the Cybersecurity Dilemma; 3. The Defender's View; Overview; A Network Defense Model; How Network Intrusions Can Help Defenders.
|
505 |
8 |
|
|a Conclusion: The Second Pillar of the Cybersecurity Dilemma4. How Network Intrusions Threaten; Overview; Network Intrusions Can Enable Targeted and Powerful Cyber Attacks; Network Intrusions Can Provide a Beachhead for Further Operations; Network Intrusions Can Change the Conditions of Conflict and Competition; Network Intrusions Can Pose Major Counterintelligence Challenges; Conclusion: The Third Pillar of the Cybersecurity Dilemma; 5. The Failure of Traditional Mitigations; Overview; Offense-Defense Balance; Offense-Defense Differentiation; Greed; Unit-Level Analysis.
|
505 |
8 |
|
|a Conclusion: Reaffirmation, Not Mitigation6. Information Distribution and the Status Quo; Overview; Information Distribution; An Uncertain Status Quo; Conclusion: New Variables, New Opportunities; 7. Limitations, Objections, and the Future of the Cybersecurity Dilemma; Overview; Objection: Attribution is Impossible; Objection: The Cyber Threat is Not Existential; Objection: Cyber Capabilities are Unevenly Distributed; Conclusion: The Present and Future of the Cybersecurity Dilemma; 8. Mitigating the Cybersecurity Dilemma; Overview; The Value of Baseline Defenses; Advancing Bilateral Trust.
|
505 |
8 |
|
|a Contributions to System-wide SecurityEstablishing a Security Posture; Conclusion: Old Variables, New Mitigations; Conclusion: The Dangers of the Cybersecurity Dilemma; Notes; Bibliography; Acknowledgments; Index.
|
520 |
|
|
|a This book examines how cyber conflict could happen--even if no nation desires it. It applies the security dilemma, a long-standing idea in international relations, to cybersecurity. Drawing on a detailed analysis of leaked classified documents and cybersecurity forensic reports, this book shows how nations' methods of defending themselves in other states risk unintentionally threatening other nations and risking escalation.
|
504 |
|
|
|a Includes bibliographical references and index.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Buchanan, Ben.
|t Cybersecurity Dilemma : Hacking, Trust and Fear Between Nations.
|d Oxford : Oxford University Press, ©2017
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://academic.oup.com/book/4155
|y Click for online access
|
903 |
|
|
|a OUP-SOEBA
|
994 |
|
|
|a 92
|b HCD
|