This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of 'cyberwar'. This book seeks to progress both conceptions and…mehr
This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of 'cyberwar'. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members).
Kristan Stoddart is Associate Professor in Cyber Threats in the School of Social Sciences at Swansea University, UK, a member of Swansea's Cyber Threats Research Centre (CYTREC), and Visiting Professor at the University of South Wales. He currently holds a grant looking at EU resilience Against Hybrid Warfare. From 2014-17, he worked on a £1.2 million project which analyzed SCADA systems and the Cyber Security Lifecycle co-funded by Airbus Group and the Welsh government from which this book draws.
Inhaltsangabe
Introduction.- Chapter 1: On Cyberwar: Theorizing cyberwarfare through attacks on critical infrastructure - Reality, potential and debates.- Chapter 2: Cyberwar: Attacking Critical Infrastructure.- Chapter 3: Gaining Access: Attack and defense methods and legacy systems.- Chapter 4 - Hacking the human.- Chapter 5: Non and sub-state actors: Cybercrime, terrorism and hackers.- Conclusion.
Introduction.- Chapter 1: On Cyberwar: Theorizing cyberwarfare through attacks on critical infrastructure – Reality, potential and debates.- Chapter 2: Cyberwar: Attacking Critical Infrastructure.- Chapter 3: Gaining Access: Attack and defense methods and legacy systems.- Chapter 4 – Hacking the human.- Chapter 5: Non and sub-state actors: Cybercrime, terrorism and hackers.- Conclusion.