The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations 1st edition by Ben Buchanan- Ebook PDF Instant Download/DeliveryISBN: 0190694807, 9780190694807
Full download The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations 1st edition after payment.
Product details:
ISBN-10 : 0190694807
ISBN-13 : 9780190694807
Author : Ben Buchanan
Why do nations break into one another’s most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn’t the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries’ networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation’s means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the ‘security dilemma’. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations 1st Table of contents:
1. The Security Dilemma
Overview
International Relations, Anarchy, and the Security Dilemma
The Security Dilemma and Intelligence
Conclusion: The Stakes of the Security Dilemma
2. The Intruder’s View
Overview
An Intrusion Model
How Operational Incentives Drive the Cybersecurity Dilemma
Conclusion: The First Pillar of the Cybersecurity Dilemma
3. The Defender’s View
Overview
A Network Defense Model
How Network Intrusions Can Help Defenders
Conclusion: The Second Pillar of the Cybersecurity Dilemma
4. How Network Intrusions Threaten
Overview
Network Intrusions Can Enable Targeted and Powerful Cyber Attacks
Network Intrusions Can Provide a Beachhead for Further Operations
Network Intrusions Can Change the Conditions of Conflict and Competition
Network Intrusions Can Pose Major Counterintelligence Challenges
Conclusion: The Third Pillar of the Cybersecurity Dilemma
5. The Failure of Traditional Mitigations
Overview
Offense–Defense Balance
Offense–Defense Differentiation
Greed
Unit-Level Analysis
Conclusion: Reaffirmation, Not Mitigation
6. Information Distribution and the Status Quo
Overview
Information Distribution
An Uncertain Status Quo
Conclusion: New Variables, New Opportunities
7. Limitations, Objections, and the Future of the Cybersecurity Dilemma
Overview
Objection: Attribution is Impossible
Objection: The Cyber Threat is Not Existential
Objection: Cyber Capabilities are Unevenly Distributed
Conclusion: The Present and Future of the Cybersecurity Dilemma
8. Mitigating the Cybersecurity Dilemma
Overview
The Value of Baseline Defenses
Advancing Bilateral Trust
Contributions to System-wide Security
Establishing a Security Posture
Conclusion: Old Variables, New Mitigations
Conclusion: The Dangers of the Cybersecurity Dilemma
People also search for The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations 1st:
the ethical dilemmas of ai in cybersecurity
what is the dilemma in the social dilemma
ethical dilemma cyber security
the social dilemma cyberbullying
the cybersecurity playbook