The Cybersecurity Dilemma : Hacking, Trust and Fear Between Nations.

This book examines how cyber conflict could happen--even if no nation desires it. It applies the security dilemma, a long-standing idea in international relations, to cybersecurity. Drawing on a detailed analysis of leaked classified documents and cybersecurity forensic reports, this book shows how...

Full description

Saved in:
Bibliographic Details
Main Author: Buchanan, Ben
Format: eBook
Language:English
Published: Oxford : Oxford University Press, 2017.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Cover; Half-title; Title; Copyright; Contents; List of Acronyms; Introduction; The Approach; Definitions and Limitations; 1. The Security Dilemma; Overview; International Relations, Anarchy, and the Security Dilemma; The Security Dilemma and Intelligence; Conclusion: The Stakes of the Security Dilemma; 2. The Intruder's View; Overview; An Intrusion Model; How Operational Incentives Drive the Cybersecurity Dilemma; Conclusion: The First Pillar of the Cybersecurity Dilemma; 3. The Defender's View; Overview; A Network Defense Model; How Network Intrusions Can Help Defenders.
  • Conclusion: The Second Pillar of the Cybersecurity Dilemma4. How Network Intrusions Threaten; Overview; Network Intrusions Can Enable Targeted and Powerful Cyber Attacks; Network Intrusions Can Provide a Beachhead for Further Operations; Network Intrusions Can Change the Conditions of Conflict and Competition; Network Intrusions Can Pose Major Counterintelligence Challenges; Conclusion: The Third Pillar of the Cybersecurity Dilemma; 5. The Failure of Traditional Mitigations; Overview; Offense-Defense Balance; Offense-Defense Differentiation; Greed; Unit-Level Analysis.
  • Conclusion: Reaffirmation, Not Mitigation6. Information Distribution and the Status Quo; Overview; Information Distribution; An Uncertain Status Quo; Conclusion: New Variables, New Opportunities; 7. Limitations, Objections, and the Future of the Cybersecurity Dilemma; Overview; Objection: Attribution is Impossible; Objection: The Cyber Threat is Not Existential; Objection: Cyber Capabilities are Unevenly Distributed; Conclusion: The Present and Future of the Cybersecurity Dilemma; 8. Mitigating the Cybersecurity Dilemma; Overview; The Value of Baseline Defenses; Advancing Bilateral Trust.
  • Contributions to System-wide SecurityEstablishing a Security Posture; Conclusion: Old Variables, New Mitigations; Conclusion: The Dangers of the Cybersecurity Dilemma; Notes; Bibliography; Acknowledgments; Index.