Book description
Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare.
The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks.
Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, geopolitics, information technologies, etc.
Table of contents
- Cover
- Title Page
- Copyright
- Introduction
- List of Acronyms
-
Chapter 1. Cyberwar and its Borders
- 1.1. The seduction of cyberwar
- 1.2. Desirable, vulnerable and frightening information
- 1.3. Conflict and its dimensions
- 1.4. The Helm and space
- 1.5. Between knowledge and violence
- 1.6. Space, distance and paths
- 1.7. The permanency of war
- 1.8. No war without borders
- 1.9. The enemy and the sovereign
- 1.10. Strengths and weaknesses
- 1.11. Bibliography
-
Chapter 2. War of Meaning, Cyberwar and Democracies
- 2.1. Introduction
-
2.2. Informational environment, a new operating space for strategy
-
2.2.1. War and information: stakes for the West
- 2.2.1.1. Information society and 21st Century conflicts
- 2.2.1.2. Informational environment and cyberspace
- 2.2.1.3. Emergence of non-state controlled actors
- 2.2.1.4. The West perceived negatively by the non-western wor
- 2.2.1.5. A thought to be renewed on the concept of subversion
- 2.2.1.6. The debate on the use of force
- 2.2.1.7. The rejection of death in the West
- 2.2.1.8. Soldier-citizen and individual freedom of expression
-
2.2.2. Strategy in the information environment
- 2.2.2.1. The global nature of the State’s strategy in resolving crises
- 2.2.2.2. Comprehensive approach and military strategy
- 2.2.2.3. About the influence strategy of Western democracies
- 2.2.2.4. The return to ideologies
- 2.2.2.5. War of meaning and strategic communication
- 2.2.2.6. NATO and strategic communication(s) in Afghanistan
-
2.2.3. Winning the battle of legitimacies
- 2.2.3.1. Creating legitimacy out of a military intervention
- 2.2.3.2. The asymmetry of ethics
- 2.2.3.3. Why fight?
- 2.2.3.4. Necessary domestic adherence
- 2.2.3.5. Sensitizing domestic public opinion
- 2.2.3.6. What is propaganda today?
- 2.2.3.7. The Internet: new battlefield for propaganda
- 2.2.3.8. Communication or propaganda
-
2.2.1. War and information: stakes for the West
- 2.3. Influence strategy: defeating and limiting armed force physical involvement
- 2.4. Conclusion
- 2.5. Bibliography
- Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise
-
Chapter 4. Cyberconflict: Stakes of Power
-
4.1. Stakes of power
- 4.1.1. Power relations
- 4.1.2. Expression of sovereignty
- 4.1.3. Cyberpower
- 4.1.4. Measuring and locating power
- 4.1.5. Limits of exercising power
- 4.1.6. The Monroe doctrine
- 4.1.7. Globalization
- 4.1.8. Shock theories
- 4.1.9. Naval and maritime power strategy
- 4.1.10. Air/space and cybernetic power: analogies
- 4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons
- 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons
- 4.1.13. Cyberconflict and new wars
- 4.2. The Stuxnet affair
- 4.3. Bibliography
-
4.1. Stakes of power
-
Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct
- 5.1. Introduction
- 5.2. Towards a broader concept of cyberwar
- 5.3. Concept of critical infrastructure
- 5.4. Different phases of a cyberattack
- 5.5. A few “elementary building blocks”
- 5.6. Example scenario
- 5.7. Conclusion
- 5.8. Bibliography
-
Chapter 6. Riots in Xinjiang and Chinese Information Warfare? 285
- 6.1. Xinjiang region: an explosive context
- 6.2. Riots, July 2009
-
6.3. Impacts on Chinese cyberspace: hacktivism and site defacing
- 6.3.1. The Internet in Xinjiang: a region dependent on information systems?
- 6.3.2. Website defacement in a crisis context
-
6.3.3. Defining the dynamics of the relationship between “political events” and “site defacement”
- 6.3.3.1. Defacements on the .cn domain
- 6.3.3.2. Defacements on .hk domains
- 6.3.3.3. Defacements on the .tw domain
- 6.3.3.4. Defacements on the .mo domain
- 6.3.3.5. Defacements on the .tr domain
- 6.3.3.6. Defacements on the .jp domain
- 6.3.3.7. Defacements on the .au domain
- 6.3.3.8. Involved hacktivists
- 6.3.3.9. Content of the claims
- 6.4. Managing the “cyberspace” risk by the Chinese authorities
- 6.5. Chinese information warfare through the Xinjiang crisis
- 6.6. Conclusion
- 6.7. Bibliography
- Chapter 7. Special Territories
- Conclusion
- List of Authors
- Index
Product information
- Title: Cyberwar and Information Warfare
- Author(s):
- Release date: August 2011
- Publisher(s): Wiley
- ISBN: 9781848213043
You might also like
book
Safeguarding Intangible Assets
Safeguarding Intangible Assets provides strategies for preserving and enhancing a company’s intangible assets to increase its …
book
Global Information Warfare, 2nd Edition
In light of increased attacks since 2002, this second edition of a significant and popular book …
book
CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition
Successful cyberattacks can damage your organisation, no matter who is behind them The goals of the …
book
Wiley Federal Government Auditing: Laws, Regulations, Standards, Practices, and Sarbanes-Oxley, 2nd Edition
The most practical, authoritative guide to Federal Government auditing Now in its second edition, Wiley Federal …