The Cybersecurity Dilemma : Hacking, Trust and Fear Between Nations.

This book examines how cyber conflict could happen--even if no nation desires it. It applies the security dilemma, a long-standing idea in international relations, to cybersecurity. Drawing on a detailed analysis of leaked classified documents and cybersecurity forensic reports, this book shows how...

Full description

Saved in:
Bibliographic Details
Main Author: Buchanan, Ben
Format: eBook
Language:English
Published: Oxford : Oxford University Press, 2017.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 i 4500
001 ocn973188302
003 OCoLC
005 20240623213015.0
006 m o d
007 cr |n|---|||||
008 170218s2017 enk ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDX  |d OCLCF  |d STBDS  |d FIE  |d OCLCQ  |d OCLCA  |d MERUC  |d OCLCQ  |d LVT  |d OCLCQ  |d UKAHL  |d OCLCQ  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 973752818  |a 973795613  |a 973833746  |a 974453444 
020 |a 9780190694692 
020 |a 0190694696 
020 |z 1849047138 
020 |z 9781849047135 
035 |a (OCoLC)973188302  |z (OCoLC)973752818  |z (OCoLC)973795613  |z (OCoLC)973833746  |z (OCoLC)974453444 
050 4 |a TK5105.59  |b .B83 2016 
049 |a HCDD 
100 1 |a Buchanan, Ben. 
245 1 4 |a The Cybersecurity Dilemma :  |b Hacking, Trust and Fear Between Nations. 
260 |a Oxford :  |b Oxford University Press,  |c 2017. 
300 |a 1 online resource (300 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Half-title; Title; Copyright; Contents; List of Acronyms; Introduction; The Approach; Definitions and Limitations; 1. The Security Dilemma; Overview; International Relations, Anarchy, and the Security Dilemma; The Security Dilemma and Intelligence; Conclusion: The Stakes of the Security Dilemma; 2. The Intruder's View; Overview; An Intrusion Model; How Operational Incentives Drive the Cybersecurity Dilemma; Conclusion: The First Pillar of the Cybersecurity Dilemma; 3. The Defender's View; Overview; A Network Defense Model; How Network Intrusions Can Help Defenders. 
505 8 |a Conclusion: The Second Pillar of the Cybersecurity Dilemma4. How Network Intrusions Threaten; Overview; Network Intrusions Can Enable Targeted and Powerful Cyber Attacks; Network Intrusions Can Provide a Beachhead for Further Operations; Network Intrusions Can Change the Conditions of Conflict and Competition; Network Intrusions Can Pose Major Counterintelligence Challenges; Conclusion: The Third Pillar of the Cybersecurity Dilemma; 5. The Failure of Traditional Mitigations; Overview; Offense-Defense Balance; Offense-Defense Differentiation; Greed; Unit-Level Analysis. 
505 8 |a Conclusion: Reaffirmation, Not Mitigation6. Information Distribution and the Status Quo; Overview; Information Distribution; An Uncertain Status Quo; Conclusion: New Variables, New Opportunities; 7. Limitations, Objections, and the Future of the Cybersecurity Dilemma; Overview; Objection: Attribution is Impossible; Objection: The Cyber Threat is Not Existential; Objection: Cyber Capabilities are Unevenly Distributed; Conclusion: The Present and Future of the Cybersecurity Dilemma; 8. Mitigating the Cybersecurity Dilemma; Overview; The Value of Baseline Defenses; Advancing Bilateral Trust. 
505 8 |a Contributions to System-wide SecurityEstablishing a Security Posture; Conclusion: Old Variables, New Mitigations; Conclusion: The Dangers of the Cybersecurity Dilemma; Notes; Bibliography; Acknowledgments; Index. 
520 |a This book examines how cyber conflict could happen--even if no nation desires it. It applies the security dilemma, a long-standing idea in international relations, to cybersecurity. Drawing on a detailed analysis of leaked classified documents and cybersecurity forensic reports, this book shows how nations' methods of defending themselves in other states risk unintentionally threatening other nations and risking escalation. 
504 |a Includes bibliographical references and index. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Buchanan, Ben.  |t Cybersecurity Dilemma : Hacking, Trust and Fear Between Nations.  |d Oxford : Oxford University Press, ©2017 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://academic.oup.com/book/4155  |y Click for online access 
903 |a OUP-SOEBA 
994 |a 92  |b HCD