Books on the topic 'Strategic cyber security'

To see the other types of publications on this topic, follow the link: Strategic cyber security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 37 books for your research on the topic 'Strategic cyber security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Army War College (U.S.). Strategic Studies Institute and Army War College (U.S.). Press, eds. Making strategic sense of cyber power: Why the sky is not falling. Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Operating in the digital domain: Organizing the military departments for cyber operations : hearing before the Subcommittee on Terrorism, Unconventional Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Eleventh Congress, second session, hearing held September 23, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Capabilities, United States Congress House Committee on Armed Services Subcommittee on Emerging Threats and. Digital warriors: Improving military capabilities for cyber operations : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, second session, hearing held July 25, 2012. Washington: U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hearing on National Defense Authorization Act for Fiscal Year 2012 and oversight of previously authorized programs before the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session: Subcommittee on Emerging Threats and Capabilities hearing on budget request for U.S. Cyber Command, hearing held March 16, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Trim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Routledge, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Strategic Cyber Security Management. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Trim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Trim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Trim, Peter, and Yang-Im Lee. Strategic Cyber Security Management. Routledge, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Strategic Cyber Deterrence. Rowman & Littlefield Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jasper, Scott. Strategic Cyber Deterrence: The. Rowman & Littlefield Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Gheorghe, A. V., U. Tatar, and Y. Gokce. Strategic Cyber Defense: A Multidisciplinary Perspective. IOS Press, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Douzet, Frédérick. Cyber-Security Challenges. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0031.

Full text
Abstract:
With the expansion of cyberspace, European armed forces are confronted by new challenges. Cyber threats keep growing more sophisticated, targeted, and powerful. Not only states, but also individuals, political groups, and criminal and terrorist organizations use these rather affordable and widely accessible technologies remotely to conduct operations such as espionage, sabotage, information warfare, or influence. Russian nationalist propaganda has made a powerful comeback on social networks, along with ISIS propaganda. Cyber attacks for neutralization or strategic espionage have increased in worrying proportions. The specificities inherent to cyberspace and the unusual intertwining of political, economic, and military issues represent a real challenge for the elaboration and the implementation of a strategic or tactical response. They also represent a challenge for international cooperation in crisis resolutions and the conduct of military operations.
APA, Harvard, Vancouver, ISO, and other styles
14

Fischerkeller, Michael P., Emily O. Goldman, Richard J. Harknett, and Paul M. Nakasone. Cyber Persistence Theory. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197638255.001.0001.

Full text
Abstract:
Cyber persistence theory introduces a new logic and lexicon aligned to the empirical experience of cyber activity in international relations. The reality of State behavior and interaction in cyberspace has been quite different from the model of war and coercion upon which many countries base their cyber strategies. This unexpected reality has developed because security in and through cyberspace rests on a distinct set of features that differ from the dominant security paradigms associated with nuclear and conventional weapons environments. Cyber persistence theory posits the existence of a distinct strategic environment supporting the logic of exploitation rather than coercion. To achieve security in this cyber strategic environment, States must engage in initiative persistence, continuously setting and maintaining the conditions of security in their favor. The theory introduces the key concept of the cyber fait accompli and addresses the potential for cyber stability through a tacit bargaining process. The book provides empirical evidence of strategic cyber campaigning and details how the cyber strategic environment can impact State behavior with a case study of the United States. The cyber strategic environment requires its own theory to achieve security. Whereas security requires States to triumph in war in the conventional environment and avoid war in the nuclear environment, States in the cyber strategic environment may have a true alternative to war in order to achieve strategically relevant outcomes. Understanding how States will leverage that alternative is the central question of early twenty-first-century international security.
APA, Harvard, Vancouver, ISO, and other styles
15

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations. Brookings Institution Press, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Cornish, Paul, ed. The Oxford Handbook of Cyber Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/oxfordhb/9780198800682.001.0001.

Full text
Abstract:
As societies, governments, corporations, and individuals become more dependent on the digital environment, so they also become increasingly vulnerable to misuse of that environment. A considerable industry has developed to provide the means with which to make cyberspace more secure, stable, and predictable. Cybersecurity is concerned with the identification, avoidance, management, and mitigation of risk in, or from, cyberspace—the risk of harm and damage that might occur as the result of everything from individual carelessness to organized criminality, to industrial and national security espionage, and, at the extreme end of the scale, to disabling attacks against a country’s critical national infrastructure. But this represents a rather narrow understanding of security and there is much more to cyberspace than vulnerability, risk, and threat. As well as security from financial loss, physical damage, etc., cybersecurity must also be for the maximization of benefit. The Oxford Handbook of Cybersecurity takes a comprehensive and rounded approach to the still evolving topic of cybersecurity: the security of cyberspace is as much technological as it is commercial and strategic; as much international as regional, national, and personal; and as much a matter of hazard and vulnerability as an opportunity for social, economic, and cultural growth.
APA, Harvard, Vancouver, ISO, and other styles
17

Sain, Mangal, Ahmed A. Al-Absi, Pardeep Kumar, and Prasant Kumar Pattnaik. Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation. Springer Singapore Pte. Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sain, Mangal, Ahmed A. Al-Absi, Pardeep Kumar, and Prasant Kumar Pattnaik. Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation. Springer Singapore Pte. Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sain, Mangal, Ahmed A. Al-Absi, and Prasant Kumar Pattnaik. Proceedings of 2nd International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation. Springer Singapore Pte. Limited, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ibp, Inc. US National Cyber Security Strategy and Programs Handbook Volume 1 Strategic Information and Developments. Lulu Press, Inc., 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cavelty, Myriam Dunn. Aligning Security Needs for Order in Cyberspace. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198828945.003.0006.

Full text
Abstract:
Due to heightened threat perceptions, states are currently expanding their coercive power in cyberspace. They attempt to reduce the risk of escalation in (cybered-)conflict through traditional norms building. At the same time, their strategic actions remain the biggest threat to stability. Cyber-exploitations are a major part of the problem, hindering the removal of known insecurities, thus reducing the effectiveness of any future order. At the same time, the forceful role that states aspire to play in cyber-security has led to questions of legitimacy. The security arrangements that emerged in the 1990s, focused on protection and risk management, had a high degree of legitimacy because they built on a pragmatic solution of distributed security provision. Unless a future order in cyberspace takes into account the interests of companies and consumers who shape this domain in peacetime, it will be met with considerable resistance, with high costs for all sides.
APA, Harvard, Vancouver, ISO, and other styles
22

Paul. The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces. RAND Corporation, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces. RAND Corporation, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

@War: The Rise of the Military-Internet Complex. Eamon Dolan/Houghton Mifflin Harcourt, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Valeriano, Brandon. China and the Technology Gap. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0006.

Full text
Abstract:
The discourse on Chinese cyber security practices often fails to match the reality of actual behavior. This chapter examines how Beijing uses the digital domain in rival interactions. First, it unpacks the literature on how China uses cyber capabilities to shape the international system and enable its rise as a great power, highlighting how threat inflation crowds out empirical perspectives that demonstrate stability and predictability. Second, it situates Beijing’s approach to the digital domain in Chinese strategic theory, illustrating China’s early focus on innovation and preemption and its evolution toward using digital power to control the domestic population and seek information advantages. Third, it uses these insights to analyze empirically all publicly attributed Chinese cyber incidents. This portrait highlights the unique leverage, and limitations, of cyber espionage as a form of coercive bargaining between rival states.
APA, Harvard, Vancouver, ISO, and other styles
26

Valeriano, Brandon. Conclusion. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0008.

Full text
Abstract:
This book emerges from a critical gap in the cyber security literature. Scholars and policy makers alike have struggled to examine cyber coercion empirically. Despite limitations inherent in collecting data on covert action, without systematically examining cyber exchanges it is difficult to understand contemporary strategic competition. What is the purpose of cyber coercion? How do rival states align ends, ways, and means? Does it work? There are constraints and challenges in applying new methods of influence to coerce a target to change their behavior. Compellence is difficult and costly, requiring an accumulation of efforts to achieve effects. This suggests scholars should take an evolutionary perspective on the utility of new weapons and their ability to leverage power and influence. The key for states seeking to avoid dangerous escalation is to create new norms, share information on attacks and vulnerabilities, and encourage public-private multilateral frameworks that help restrain our worst tendencies.
APA, Harvard, Vancouver, ISO, and other styles
27

Manjikian, Mary, and Scott N. Romaniuk. Routledge Companion to Global Cyber-Security Strategy. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Manjikian, Mary, and Scott N. Romaniuk. Routledge Companion to Global Cyber-Security Strategy. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Manjikian, Mary, and Scott N. Romaniuk. Routledge Companion to Global Cyber-Security Strategy. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Maness, Ryan C., and Brandon Valeriano. International Cyber Conflict and National Security. Edited by Derek S. Reveron, Nikolas K. Gvosdev, and John A. Cloud. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.25.

Full text
Abstract:
Cyber conflict is often called the fifth domain of conflict. As more and more systems, networks, and information become digitized, there is contestation as to the growing nature of the threat and how exactly this domain can be exploited to coerce the enemy for either geopolitical or financial gain. Some argue that the cyber threat is exponentially growing and that offensive dominance reigns, making cyber conflict extremely unstable. Others contest that the threat is overblown and is more socially constructed. In this chapter we take a middle ground and find that much of the cyber conflict and security discourse has gotten it wrong through conjecture and worst- (or best-) case scenarios. We argue that a system of norms must be built upon and preserved to keep cyberspace a domain of relative openness and nonescalation. Arms races and deterrence strategies are not the path forward for a secure, prosperous cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
31

Falco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Full text
Abstract:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization.
APA, Harvard, Vancouver, ISO, and other styles
32

Conflict in Cyper-Space: Theoretical, Strategic, Legal and Ethical Implications. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Army War College (U.S.). Strategic Studies Institute and Army War College (U.S.). Press, eds. Stand up and fight!: The creation of U.S. security organizations, 1942-2005. 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Samuels, Richard J. Special Duty. Cornell University Press, 2019. http://dx.doi.org/10.7591/cornell/9781501741586.001.0001.

Full text
Abstract:
The prewar history of the Japanese intelligence community demonstrates how having power over much, but insight into little can have devastating consequences. Its postwar history—one of limited Japanese power despite growing insight—has also been problematic for national security. This book dissects the fascinating history of the intelligence community in Japan. Looking at the impact of shifts in the strategic environment, technological change, and past failures, it probes the reasons why Japan has endured such a roller-coaster ride when it comes to intelligence gathering and analysis, and concludes that the ups and downs of the past century—combined with growing uncertainties in the regional security environment—have convinced Japanese leaders of the critical importance of striking balance between power and insight. Using examples of excessive hubris and debilitating bureaucratic competition before the Asia-Pacific War, the unavoidable dependence on U.S. assets and popular sensitivity to security issues after World War II, and the tardy adoption of image-processing and cyber technologies, the book highlights the century-long history of Japan's struggles to develop a fully functioning and effective intelligence capability, and makes clear that Japanese leaders have begun to reinvent their nation's intelligence community.
APA, Harvard, Vancouver, ISO, and other styles
35

Vishwanath, Arun. The Weakest Link. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/14653.001.0001.

Full text
Abstract:
An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizational cyber resilience. Phishing is the single biggest threat to cybersecurity, persuading even experienced users to click on hyperlinks and attachments in emails that conceal malware. Phishing has been responsible for every major cyber breach, from the infamous Sony hack in 2014 to the 2017 hack of the Democratic National Committee and the more recent Colonial Pipleline breach. The cybersecurity community's response has been intensive user training (often followed by user blaming), which has proven completely ineffective: the hacks keep coming. In The Weakest Link, cybersecurity expert Arun Vishwanath offers a new, evidence-based approach for detecting and defending against phishing—an approach that doesn't rely on continual training and retraining but provides a way to diagnose user vulnerability. Vishwanath explains how organizations can build a culture of cyber safety. He presents a Cyber Risk Survey (CRS) to help managers understand which users are at risk and why. Underlying CRS is the Suspicion, Cognition, Automaticity Model (SCAM), which specifies the user thoughts and actions that lead to either deception by or detection of phishing come-ons. He describes in detail how to implement these frameworks, discussing relevant insights from cognitive and behavioral science, and then presents case studies of organizations that have successfully deployed the CRS to achieve cyber resilience. These range from a growing wealth management company with twenty regional offices to a small Pennsylvania nonprofit with forty-five employees. The Weakest Link will revolutionize the way managers approach cyber security, replacing the current one-size-fits-all methodology with a strategy that targets specific user vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
36

Bolt, Paul J., and Sharyl N. Cross. China, Russia, and Twenty-First Century Global Geopolitics. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198719519.001.0001.

Full text
Abstract:
This book provides a comprehensive analysis of the Chinese–Russian bilateral relationship, grounded in a historical perspective, and discusses the implications of the partnership between these two major powers for world order and global geopolitics. The volume compares the national worldviews, priorities, and strategic visions for the Chinese and Russian leadership, examining several aspects of the relationship in detail. The energy trade is the most important component of economic ties, although both sides desire to broaden trade and investments. In the military realm, Russia sells advanced arms to China, and the two countries engage in regular joint exercises. Diplomatically, these two Eurasian powers take similar approaches to conflicts in Ukraine and Syria, and also cooperate on non-traditional security issues, including preventing colored revolutions, cyber management, and terrorism. These issue areas illustrate four themes. Russia and China have common interests that cement their partnership, including security, protecting authoritarian institutions, and reshaping aspects of the global order. They are key players challenging the United States and the Western liberal order, influencing not only regional issues, but also international norms and institutions. Nevertheless, Western nations remain important for China and Russia. Both seek better relations with the West, but on the basis of “mutual respect” and “equality.” Lastly, Russia and China have frictions in their relationship, and not all of their interests overlap. While the relationship has grown, particularly since 2014, China and Russia are partners but not allies.
APA, Harvard, Vancouver, ISO, and other styles
37

Bajpai, Asha. Making Child Rights a Reality. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199470716.003.0009.

Full text
Abstract:
This concluding chapter provides legal strategies for empowerment of children and realization of child rights in practice. The chapter states the paradigm shift towards approached relating to children from welfare to rights. It enumerates the major concerns and obstacles in realizing the rights of the child in India. It provides recommendations for legislative reform in support of children in laws relating to child labour child abuse, child marriages, juvenile justice, child trafficking food security surrogacy, cyber-crimes, child witnesses, and victims. It suggests representation of children in courts, providing legal aid services to children. It suggests harmonization of laws and the working together approach for a child friendly justice for good governance and full enjoyment of child rights.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography