Atnaujinkite slapukų nuostatas

Cyber Security Challenges Confronting Canada and the United States New edition [Kietas viršelis]

  • Formatas: Hardback, 148 pages, aukštis x plotis: 225x150 mm, weight: 311 g, 12 Illustrations
  • Išleidimo metai: 30-Oct-2020
  • Leidėjas: Peter Lang Publishing Inc
  • ISBN-10: 1433181002
  • ISBN-13: 9781433181009
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 148 pages, aukštis x plotis: 225x150 mm, weight: 311 g, 12 Illustrations
  • Išleidimo metai: 30-Oct-2020
  • Leidėjas: Peter Lang Publishing Inc
  • ISBN-10: 1433181002
  • ISBN-13: 9781433181009
Kitos knygos pagal šią temą:
"This study looked at taking a conventional understanding of the four instruments of national power (diplomacy, information, military and economic measures/D.I.M.E.) and turning the tables to see how potential adversaries could use these against the national security interests of Canada and the United States. Moreover, this particular work focused on qualitative research regarding cyber threats that have continually beleaguered these nations by malevolent actors mostly over the last five years. The studyalso affords consideration to how nefarious individuals, non-state actors, or nation states can implement the instruments of national power through the application of a new model named the York Intelligence Red Team Model-Cyber (YIRTM-C) using sources guided by the Federal Qualitative Secondary Data Case Study Triangulation Model to arrive at results"--

Recenzijos

Wars of the future will be based on cyberattacks costing billions of dollars, destabilizing entire countries, and undermining democratic countries. Weaver and Johnson explain how cyber attacks are the single greatest threat to the national security of Canada and the United States. This book captures the use of cyber attacks in banking, elections, electrical grids, health care, and telecommunications. It is a fight over power, dominance, and control of the world stage. A must read for anyone interested in public administration and international affairs. Lorenda Naylor, Associate Professor and Director, University of Baltimore This is a timely book. The authors provide an excellent introduction to cyber security and how this important topic is handled in both the United States and Canada. The authors convey clearly how potential adversaries, whether state actors or non-state actors, employ different power tools in the cyber domain. These actors use asymmetric means in order to infiltrate and exploit cyber vulnerabilities in North America, most notably in the information domain. In presenting a simplified model and through a documented qualitative study, the book provides an overview to the reader on what to look out for and how to understand cyber security challenges in the United States and Canada. Tom Rųseth, Associate Professor of Intelligence Studies, Norwegian Defence University College Information is the core asset that ties a nations diplomatic, military, and economic capabilities together. Todays cyber technologies allow greater collection, analysis, and dissemination of that information than at any point previously in human history. The complexity of this new Cyber Domain allows for a tremendous increase in speed and capability, while also introducing new challenges that must be addressed. The barrier to entry for malicious actors, whether nation states or non-state actors, to commit harm against their enemies has been dramatically lowered. It has never been easier to commit harm to the interests of a nation and its people without the need for personal, physical risk than right now. Cyber Security Challenges Confronting Canada and the United States encapsulates the complexities of these challenges as they pertain to Canada and the United States. The authors examine how the Cyber Domain now influences and shapes those nations diplomatic, military, and economic policies. They define the new cyber domain in which nations must now operate, and illustrate various threats and risks to Canadian and U.S. interests. Also, they propose a new analytical model with which to examine these risks, and determine policy meant to mitigate them. This book is a must-read to help one understand the complexities of the cyber domain, and how it now helps shape and define policy. Robert Hunter, Cyber Forensic Examiner, Department of Defense Cyber Crime Center (DC3)

List of Illustrations
vii
List of Tables
ix
Preface xi
Chapter 1 Introduction and Background
1(16)
Chapter 2 Research Questions, Methodology, and Limitations
17(12)
Chapter 3 The Canada---U.S. Alliance
29(22)
Chapter 4 Al Qaeda
51(10)
Chapter 5 People's Republic of China (China)
61(12)
Chapter 6 Islamic Republic of Iran (Iran)
73(10)
Chapter 7 Islamic State (IS)
83(12)
Chapter 8 Democratic Republic of North Korea (DPRK/North Korea)
95(10)
Chapter 9 Russian Federation (Russia)
105(16)
Chapter 10 Analysis and Findings
121(10)
Chapter 11 Conclusion
131(12)
About the Authors 143(2)
Index 145
John Michael Weaver (DPA, University of Baltimore) is Associate Professor of Intelligence Analysis at York College of Pennsylvania (USA).



Benjamin T. Johnson is a PH.D. candidate in the field of political science at York University in Toronto (Canada).