Cover image for Cyber Conflict : Competing National Perspectives.
Cyber Conflict : Competing National Perspectives.
Title:
Cyber Conflict : Competing National Perspectives.
Author:
Ventre, Daniel.
ISBN:
9781118562741
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (313 pages)
Series:
Iste
Contents:
Cover -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- Chapter 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy -- 1.1. Introduction -- 1.2. Canada in North America: sovereign but subordinate? -- 1.3. Counter-terrorism for the improvement of national security -- 1.4. The long path to a national CI protection strategy and national cyber security strategy -- 1.5. The adoption of the current strategies for CI protection and cyber security -- 1.6. Conclusion -- 1.7. Bibliography -- 1.7.1. Scientific and media articles -- 1.7.2. Primary Data -- 1.7.3. Websites -- Chapter 2. Cuba: Towards an Active Cyber-defense -- 2.1. Cyberspace: statistics and history -- 2.1.1. The marginalization of Cuba -- 2.1.2. Cuban cyberspace as the target of attacks -- 2.2. Theoretical and practical considerations on information warfare and cyber-warfare -- 2.2.1. Development of capabilities -- 2.3. Cyber-warfare theories and practices -- 2.3.1. Fidel Castro's discourse -- 2.3.2. The concept of active cyber-defense -- 2.4. Regulations and ways around them -- 2.4.1. The State's influence over cyberspace -- 2.4.2. Getting around the restrictions -- 2.5. Capabilities of control, surveillance and interception -- 2.6. Enemies -- 2.7. Conclusion -- 2.8. Bibliography -- Chapter 3. French Perspectives on Cyber-conflict -- 3.1. Cyberspace -- 3.2. Assessments, view on the world and awakening -- 3.2.1. Attacks -- 3.2.2. The feeling of insecurity, the threat -- 3.2.3. Potential vulnerabilities of States -- 3.2.4. Evolution of the international environment -- 3.3. Reaction, position of France and choice: theories, political strategies and military doctrines -- 3.3.1. Information: a powerful weapon for those controlling it -- 3.3.2. Media information: beneficial if controlled -- 3.3.3. Economic information as power, if controlled.

3.3.4. Information warfare -- 3.3.5. Information warfare or information control -- 3.3.6. The ANSSI -- 3.3.7. Cyber-security and cyber-defense -- 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development -- 3.3.9. Cyber-war and other modalities of the cyber-conflict -- 3.4. Conclusion -- 3.5. Bibliography -- Chapter 4. Digital Sparta: Information Operations and Cyber-warfare in Greece -- 4.1. Geopolitical significance -- 4.2. Strategic concerns and internal balancing -- 4.3. Formative experiences in information operations: the Ergenekon conspiracy -- 4.4. Formative experiences in information operations: intensifying cyber-attacks -- 4.5. Formative experiences in information operations: the Öcalan affair -- 4.6. Formative experiences in information operations: the Greek wiretapping case of 2004-2005 -- 4.7. Emerging civilian information operations strategies -- 4.8. Emerging military information operations strategies -- 4.9. The European Union dimension in Greek information operations -- 4.10. Conclusion -- 4.11. Bibliography -- Chapter 5. Moving Toward an Italian Cyber Defense and Security Strategy -- 5.1. Information warfare and cyber warfare: what are they? -- 5.2. Understanding the current Italian geopolitical context -- 5.3. The Italian legal and organizational framework -- 5.4. The need for a national cyber-defense and -security strategy -- 5.5. Conclusion -- 5.6. Bibliography -- Chapter 6. Cyberspace in Japan's New Defense Strategy -- 6.1. Japan's defense policy -- 6.2. Cyberspace in Japan's defense strategy -- 6.2.1. The context -- 6.2.2. Cyberspace in security and defense policies -- 6.3. Conclusion -- 6.4. Bibliography -- Chapter 7. Singapore's Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements.

7.1. Singapore: electronic globalization and its pitfalls -- 7.2. Cyberdefence in the private sector and society at large -- 7.3. The Singapore Armed Forces and the embrace of third-generation warfare -- 7.3.1. Force multiplication -- 7.3.2. Continually revitalizing existing conventional arms capabilities -- 7.3.3. Generating asymmetrical advantages in operational transparency -- 7.4. Conclusion -- 7.5. Bibliography -- Chapter 8. A Slovenian Perspective on Cyber Warfare -- 8.1. Introduction -- 8.2. Preparations for digital warfare -- 8.3. Specifics of technologically-advanced small countries -- 8.4. Geostrategic, geopolitics and the economic position of the Republic of Slovenia -- 8.5. Information and communication development in Slovenia -- 8.6. Cyber-threats in Slovenia -- 8.7. Slovenia in the field of information and communication security policy -- 8.8. Slovenia's information and communication security policy strategy -- 8.8.1. The EU information and communication security policy -- 8.8.2. NATO's information and communications security policy -- 8.8.3. Slovenia's information and communication security policy -- 8.8.4. Analysis of key strategic documents regulating the field of information and communication security policy in the Republic of Slovenia -- 8.8.5. National bodies that govern the field of information and communication security policy in the Republic of Slovenia -- 8.8.6. Directorate for information society (Ministry of Higher Education, Science and Technology) -- 8.8.7. Slovenian Computer Emergency Response Team -- 8.8.8. Directorate of e-Government and Administrative Processes (Ministry of Public Administration) -- 8.8.9. Office of the Government of the Republic of Slovenia for the Protection of Classified Information -- 8.8.10. Slovenian Intelligence and Security Agency -- 8.8.11. National Center for Crisis Management.

8.9. Conclusion -- 8.10. Bibliography -- Chapter 9. A South African Perspective on Information Warfare and Cyber Warfare -- 9.1. The South African structure of information warfare -- 9.2. A South African perspective on cyber-warfare -- 9.3. The Southern African cyber-environment -- 9.4. Legislation -- 9.5. Cyber-security and information warfare organizations in South Africa -- 9.6. Estimated cyber-warfare capability in Africa -- 9.7. Conclusion -- 9.8. Bibliography -- Chapter 10. Conclusion -- 10.1. Cyberspace -- 10.2. Bibliography -- List of Authors -- Index.
Abstract:
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational and strategic perspectives of cyber attack. It is original in its delivery because of its multidisciplinary approach within an international framework, with studies dedicated to different states - Canada, Cuba, France, Greece, Italy, Japan, Singapore, Slovenia and South Africa - describing the state's application of information warfare principles both in terms of global development and "local" usage and examples. Contents 1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy, Hugo Loiseau and Lina Lemay. 2. Cuba: Towards an Active Cyber-defense, Daniel Ventre. 3. French Perspectives on Cyber-conflict, Daniel Ventre. 4. Digital Sparta: Information Operations and Cyber-warfare in Greece, Joseph Fitsanakis. 5. Moving Toward an Italian Cyber Defense and Security Strategy, Stefania Ducci. 6. Cyberspace in Japan's New Defense Strategy, Daniel Ventre. 7. Singapore's Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements, Alan Chong. 8. A Slovenian Perspective on Cyber Warfare, Gorazd Praprotnik, Iztok Podbregar, Igor Bernik and Bojan Ticar. 9. A South African Perspective on Information Warfare and Cyber Warfare, Brett van Niekerk and Manoj Maharaj. 10. Conclusion, Daniel Ventre.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: