Book description
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power.
Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational and strategic perspectives of cyber attack. It is original in its delivery because of its multidisciplinary approach within an international framework, with studies dedicated to different states – Canada, Cuba, France, Greece, Italy, Japan, Singapore, Slovenia and South Africa – describing the state's application of information warfare principles both in terms of global development and "local" usage and examples.
Contents
1. Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy, Hugo Loiseau and Lina Lemay.
2. Cuba: Towards an Active Cyber-defense, Daniel Ventre.
3. French Perspectives on Cyber-conflict, Daniel Ventre.
4. Digital Sparta: Information Operations and Cyber-warfare in Greece, Joseph Fitsanakis.
5. Moving Toward an Italian Cyber Defense and Security Strategy, Stefania Ducci.
6. Cyberspace in Japan's New Defense Strategy, Daniel Ventre.
7. Singapore's Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements, Alan Chong.
8. A Slovenian Perspective on Cyber Warfare, Gorazd Praprotnik, Iztok Podbregar, Igor Bernik and Bojan Ticar.
9. A South African Perspective on Information Warfare and Cyber Warfare, Brett van Niekerk and Manoj Maharaj.
10. Conclusion, Daniel Ventre
Table of contents
- Cover
- Title Page
- Copyright
- Introduction
-
Chapter 1: Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy
- 1.1. Introduction
- 1.2. Canada in North America: sovereign but subordinate?
- 1.3. Counter-terrorism for the improvement of national security
- 1.4. The long path to a national CI protection strategy and national cyber security strategy
- 1.5. The adoption of the current strategies for CI protection and cyber security
- 1.6. Conclusion
- 1.7. Bibliography
-
Chapter 2: Cuba: Towards an Active Cyber-defense
- 2.1. Cyberspace: statistics and history
- 2.2. Theoretical and practical considerations on information warfare and cyber-warfare
- 2.3. Cyber-warfare theories and practices
- 2.4. Regulations and ways around them
- 2.5. Capabilities of control, surveillance and interception
- 2.6. Enemies
- 2.7. Conclusion
- 2.8. Bibliography
-
Chapter 3: French Perspectives on Cyber-conflict
- 3.1. Cyberspace
- 3.2. Assessments, view on the world and awakening
-
3.3. Reaction, position of France and choice: theories, political strategies and military doctrines
- 3.3.1. Information: a powerful weapon for those controlling it
- 3.3.2. Media information: beneficial if controlled
- 3.3.3. Economic information as power, if controlled
- 3.3.4. Information warfare
- 3.3.5. Information warfare or information control
- 3.3.6. The ANSSI
- 3.3.7. Cyber-security and cyber-defense
- 3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development
- 3.3.9. Cyber-war and other modalities of the cyber-conflict
- 3.4. Conclusion
- 3.5. Bibliography
-
Chapter 4: Digital Sparta: Information Operations and Cyber-warfare in Greece
- 4.1. Geopolitical significance
- 4.2. Strategic concerns and internal balancing
- 4.3. Formative experiences in information operations: the Ergenekon conspiracy
- 4.4. Formative experiences in information operations: intensifying cyber-attacks
- 4.5. Formative experiences in information operations: the Öcalan affair
- 4.6. Formative experiences in information operations: the Greek wiretapping case of 20042005
- 4.7. Emerging civilian information operations strategies
- 4.8. Emerging military information operations strategies
- 4.9. The European Union dimension in Greek information operations
- 4.10. Conclusion
- 4.11. Bibliography
- Chapter 5: Moving Toward an Italian Cyber Defense and Security Strategy
- Chapter 6: Cyberspace in Japan's New Defense Strategy
- Chapter 7: Singapore's Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements
-
Chapter 8: A Slovenian Perspective on Cyber Warfare
- 8.1. Introduction
- 8.2. Preparations for digital warfare
- 8.3. Specifics of technologically-advanced small countries
- 8.4. Geostrategic, geopolitics and the economic position of the Republic of Slovenia
- 8.5. Information and communication development in Slovenia
- 8.6. Cyber-threats in Slovenia
- 8.7. Slovenia in the field of information and communication security policy
-
8.8. Slovenia's information and communication security policy strategy
- 8.8.1. The EU information and communication security policy
- 8.8.2. NATO's information and communications security policy
- 8.8.3. Slovenia's information and communication security policy
- 8.8.4. Analysis of key strategic documents regulating the field of information and communication security policy in the Republic of Slovenia
- 8.8.5. National bodies that govern the field of information and communication security policy in the Republic of Slovenia
- 8.8.6. Directorate for information society (Ministry of Higher Education, Science and Technology)
- 8.8.7. Slovenian Computer Emergency Response Team
- 8.8.8. Directorate of e-Government and Administrative Processes (Ministry of Public Administration)
- 8.8.9. Office of the Government of the Republic of Slovenia for the Protection of Classified Information
- 8.8.10. Slovenian Intelligence and Security Agency
- 8.8.11. National Center for Crisis Management
- 8.9. Conclusion
- 8.10. Bibliography
-
Chapter 9: A South African Perspective on Information Warfare and Cyber Warfare
- 9.1. The South African structure of information warfare
- 9.2. A South African perspective on cyber-warfare
- 9.3. The Southern African cyber-environment
- 9.4. Legislation
- 9.5. Cyber-security and information warfare organizations in South Africa
- 9.6. Estimated cyber-warfare capability in Africa
- 9.7. Conclusion
- 9.8. Bibliography
- Chapter 10: Conclusion
- List of Authors
- Index
Product information
- Title: Cyber Conflict: Competing National Perspectives
- Author(s):
- Release date: May 2012
- Publisher(s): Wiley
- ISBN: 9781848213500
You might also like
book
Conflict and Cooperation in Cyberspace
Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world’s …
book
Attacks on the Press
The latest, definitive assessment of the state of free press around the world Attacks on the …
book
China Versus the West: The Global Power Shift of the 21st Century
China Versus the West is an innovative book. The author, a leading specialist on the international …
book
Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set
The Wiley Handbook of Science and Technology for Homeland Security is an essential and timely collection …