Cybersecurity: What Everyone Needs to KnowDependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity and Cyberwar: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity and Cyberwar is the definitive account on the subject for the educated general reader who wants to know more about the nature of war, conflict, and security in the twenty-first century. |
Other editions - View all
Cybersecurity and Cyberwar: What Everyone Needs to Know® P.W. Singer,Allan Friedman Limited preview - 2013 |
Cybersecurity and Cyberwar: What Everyone Needs to Know® P.W. Singer,Allan Friedman Limited preview - 2013 |
Common terms and phrases
action activities actors actually agencies allow American approach arms attack bank become better building called China Chinese communication companies connection costs countries create critical cyber cyberattacks cybersecurity cyberspace defense Department described developed domain e-mail effect efforts example experts firms forces future global groups hackers human important individual industry infrastructure instance Internet issues kind known look major malware March matter means military million nuclear officials operations organizations play political problem protection question requires response risk role secret sharing standards Stuxnet things threats tion trust trying turn understand United users vulnerabilities Washington weapons