The Resource Managing Cyber Attacks in International Law, Business, and Relations : In Search of Cyber Peace

Managing Cyber Attacks in International Law, Business, and Relations : In Search of Cyber Peace

Label
Managing Cyber Attacks in International Law, Business, and Relations : In Search of Cyber Peace
Title
Managing Cyber Attacks in International Law, Business, and Relations
Title remainder
In Search of Cyber Peace
Creator
Subject
Genre
Language
eng
Summary
This book presents a novel framework to reconceptualize internet governance and better manage cyber attacks
Cataloging source
MiAaPQ
http://library.link/vocab/creatorName
Shackelford, Scott J
Dewey number
343.0999
LC call number
KZ6718 .S53 2013
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/subjectName
  • Computer crimes
  • Computer networks -- Security measures
  • Cyberspace -- Security measures
  • Cyberterrorism
  • Information warfare (International law)
Label
Managing Cyber Attacks in International Law, Business, and Relations : In Search of Cyber Peace
Link
https://ebookcentral.proquest.com/lib/oulaw/detail.action?docID=1139663
Instantiates
Publication
Copyright
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover -- Half title -- Title -- Copyright -- Dedication -- Epigraph -- Contents -- Tables and Figures -- Foreword -- Preface -- Cyber War and Peace -- Key Terms -- Acknowledgments -- Abbreviations -- Part I Foundations of Polycentric Governance in Cyberspace -- 1 Defining the Cyber Threat in Internet Governance -- Understanding the Cyber Threat -- Cyber War -- Cyber Espionage -- Cybercrime -- Cyber Terrorism -- Summary -- Fractured Internet Governance and Its Security Implications -- The Unplanned, Well-Planned Internet -- Institutionalized Governance: ICANN and the Precarious Root -- The Early Internet's Address System and the Man Who Could Have Erased It -- DNS Wars: The U.S. Government Strikes Back -- ICANN and the Cyber Regime Complex -- ICANN: Walking the Virtual Tightrope -- Bottom-Up Governance and the Informal IETF -- "Code is Law" -- The Digital World is Flat: Self-Organization through the IETF -- Networked, Flat, and Crowded: The Evolution of Internet Governance -- Summary -- 2 Who Controls Cyberspace? Analyzing Cyber Regulation through Polycentric Governance -- What Is Cyberspace? -- Introducing the Global Commons -- The Cyber Pseudo Commons -- Tragedy of the Cyber Pseudo Commons -- National Regulation in Cyberspace -- The Origins and Purpose of Cyber Censorship -- Types of Content Filtering -- National Approaches to Censorship -- Internet Sovereignty? An Internet with Chinese Characteristics -- Internet Freedom? U.S. Cyber Censorship -- The Cost and Future of Internet Censorship -- The Role of the Private Sector in Managing Cyberspace -- Sovereignty in the Cyber Pseudo Commons -- Option 1: Regulating Cyberspace through the Effects Doctrine -- Option 2: Regulating Cyberspace through the CHM Concept -- Polycentric Regulation in Cyberspace: A Framework for Analyzing Cybersecurity Challenges -- Regulatory Approaches in Cyberspace
  • Polycentric Institutional Analysis and Climate Change -- Introducing Polycentric Governance -- Applying Polycentric Governance to Cybersecurity -- Defined Boundaries -- Proportionality -- Collective-Choice Arrangements and Minimal Recognition of Rights -- Monitoring -- Graduated Sanctions and Dispute Resolution -- Nested Enterprises -- Polycentricity and Cybersecurity -- Summary -- Part II Managing Vulnerabilities -- 3 Hacking the Planet, the Dalai Lama, and You -- Regulating through Network Architecture to Enhance Cybersecurity -- Securing the Internet's Physical Infrastructure -- Managing Vulnerabilities in the Logical Infrastructure -- TCP/IP -- DNS -- BGP -- Protocol Fixes -- IPsec -- DNSSEC -- Securing TCP and BGP -- Debugging and Regulating through Code -- The Threat of Social Engineering to the Content Layer -- Summary -- Cybersecurity 101: Understanding the Weapons -- Spyware -- Trojan Horses -- Viruses -- Worms -- Logic Bombs -- DDoS Attacks -- Zero-Day Exploits -- Summary -- Cybersecurity 102: Using the Weapons -- From the Foothills of the Himalayas to the Frontiers of Cyberspace: Cyber Weapons, States, and the Problem of Attribution -- Understanding the Cyber Threat Ecosystem within a Polycentric Framework -- 4 The New Cyber Warfare -- Defining the New Cyber Warfare -- A Short History of Cyber Conflict -- The Opening Cyber Salvos -- Web War I? The Cyber Attacks on Estonia -- Timeline of the Cyber Attacks on Estonia -- Determining Responsibility for the Cyber Attack on Estonia -- The Reaction of the United States to the Cyber Attacks on Estonia -- Cyber Deterrence -- The Use of Cyber Attacks in the 2008 Invasion of Georgia -- Stuxnet: The Cyber Shot Heard around the World -- Summary -- National Cybersecurity Strategies of the Cyber Powers -- United States -- United Kingdom -- China -- Russia -- Israel
  • Regional Cyber Defense: NATO Cybersecurity -- A Polycentric Approach to Securing Critical National Infrastructure -- 5 Risky Business -- Defining the Cyber Threat to the Private Sector -- The Trouble with Data -- Analyzing the Cyber Threat to the Private Sector -- How Often Do Cyber Attacks Affect the Private Sector? -- Which Industries are Being Targeted? -- Which Types of Attacks Occur Most Frequently? -- How Much Do Cyber Attacks Cost? -- Managing Uncertainty in the Cyber Threat Matrix -- Enhancing Cybersecurity through the Competitive Market -- Managing the Cyber Threat at Microsoft -- Cyber Insecurity: Proactive and Reactive Cybersecurity Strategies -- Technological and Budgetary Cybersecurity Best Practices -- Organizational Cybersecurity Best Practices: People and Processes -- Challenges to Corporate Cybersecurity -- Managing Market Imperfections through Market-Based Incentives and Regulatory Intervention -- Regulatory Intervention to Manage Cyber Attacks -- Cyber Risk Mitigation: Analyzing the Role of Cyber Risk Insurance in Enhancing Cybersecurity -- Public-Private Partnerships for Cybersecurity -- Summary -- Part III The Law, Politics, and Promise of Cyber Peace -- 6 An Introduction to the Law of Cyber War and Peace -- The Law of Cyber Peace -- A Brief Introduction to International Law -- Regulating Cyber Weapons through International Law -- Interwar Arms Control -- The Analogy of Nuclear War -- From the Digital Frontier to the Final Frontier: Arms Limitation in Space Law as an Analogy for Cyber War -- Freeze the Code: The Antarctic Treaty System Approach to Cyber Weapons -- Determining Liability for Cyber Attacks through International Communications and U.S. Cyber Law -- International Communications Law and Cyber Attacks -- U.S. Cyber Law Applied to Cyber Attacks
  • The Role of the Private Sector in Managing Cyber Attacks under International Law -- Analogizing Other Applicable Accords to Cyber Attacks -- Summary -- The Law of Cyber War -- State Responsibility for Cyber Attacks -- Cyber Attacks and Self-Defense -- The Intersections of International Humanitarian and Human Rights Law as Applied to Cybersecurity -- Applying the LOAC to Cyber Attacks -- Cyber Warfare, International Criminal Law, and Human Rights Law -- Summary -- 7 Cyber Peace -- Cyber Power and Politics in the Information Age -- Tweet Softly, but Carry a Big Stick: U.S. Cybersecurity Reform Efforts -- The Global Politics of Internet Reform -- The Future of Internet Governance -- The Rise of Polycentric Governance in Cyberspace -- Regime Effectiveness in Cyberspace -- Cybersecurity Best Practices -- Personal Cybersecurity -- Technical Cybersecurity -- Corporate Cybersecurity -- National Cybersecurity -- Toward Cyber Peace -- Conclusion -- Appendix -- Index
Dimensions
unknown
Extent
1 online resource (436 pages)
Form of item
online
Isbn
9781107347656
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Sound
unknown sound
Specific material designation
remote
System control number
  • (MiAaPQ)EBC1139663
  • (Au-PeEL)EBL1139663
  • (CaPaEBR)ebr10888057
  • (CaONFJC)MIL637857
  • (OCoLC)881886638
Label
Managing Cyber Attacks in International Law, Business, and Relations : In Search of Cyber Peace
Link
https://ebookcentral.proquest.com/lib/oulaw/detail.action?docID=1139663
Publication
Copyright
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover -- Half title -- Title -- Copyright -- Dedication -- Epigraph -- Contents -- Tables and Figures -- Foreword -- Preface -- Cyber War and Peace -- Key Terms -- Acknowledgments -- Abbreviations -- Part I Foundations of Polycentric Governance in Cyberspace -- 1 Defining the Cyber Threat in Internet Governance -- Understanding the Cyber Threat -- Cyber War -- Cyber Espionage -- Cybercrime -- Cyber Terrorism -- Summary -- Fractured Internet Governance and Its Security Implications -- The Unplanned, Well-Planned Internet -- Institutionalized Governance: ICANN and the Precarious Root -- The Early Internet's Address System and the Man Who Could Have Erased It -- DNS Wars: The U.S. Government Strikes Back -- ICANN and the Cyber Regime Complex -- ICANN: Walking the Virtual Tightrope -- Bottom-Up Governance and the Informal IETF -- "Code is Law" -- The Digital World is Flat: Self-Organization through the IETF -- Networked, Flat, and Crowded: The Evolution of Internet Governance -- Summary -- 2 Who Controls Cyberspace? Analyzing Cyber Regulation through Polycentric Governance -- What Is Cyberspace? -- Introducing the Global Commons -- The Cyber Pseudo Commons -- Tragedy of the Cyber Pseudo Commons -- National Regulation in Cyberspace -- The Origins and Purpose of Cyber Censorship -- Types of Content Filtering -- National Approaches to Censorship -- Internet Sovereignty? An Internet with Chinese Characteristics -- Internet Freedom? U.S. Cyber Censorship -- The Cost and Future of Internet Censorship -- The Role of the Private Sector in Managing Cyberspace -- Sovereignty in the Cyber Pseudo Commons -- Option 1: Regulating Cyberspace through the Effects Doctrine -- Option 2: Regulating Cyberspace through the CHM Concept -- Polycentric Regulation in Cyberspace: A Framework for Analyzing Cybersecurity Challenges -- Regulatory Approaches in Cyberspace
  • Polycentric Institutional Analysis and Climate Change -- Introducing Polycentric Governance -- Applying Polycentric Governance to Cybersecurity -- Defined Boundaries -- Proportionality -- Collective-Choice Arrangements and Minimal Recognition of Rights -- Monitoring -- Graduated Sanctions and Dispute Resolution -- Nested Enterprises -- Polycentricity and Cybersecurity -- Summary -- Part II Managing Vulnerabilities -- 3 Hacking the Planet, the Dalai Lama, and You -- Regulating through Network Architecture to Enhance Cybersecurity -- Securing the Internet's Physical Infrastructure -- Managing Vulnerabilities in the Logical Infrastructure -- TCP/IP -- DNS -- BGP -- Protocol Fixes -- IPsec -- DNSSEC -- Securing TCP and BGP -- Debugging and Regulating through Code -- The Threat of Social Engineering to the Content Layer -- Summary -- Cybersecurity 101: Understanding the Weapons -- Spyware -- Trojan Horses -- Viruses -- Worms -- Logic Bombs -- DDoS Attacks -- Zero-Day Exploits -- Summary -- Cybersecurity 102: Using the Weapons -- From the Foothills of the Himalayas to the Frontiers of Cyberspace: Cyber Weapons, States, and the Problem of Attribution -- Understanding the Cyber Threat Ecosystem within a Polycentric Framework -- 4 The New Cyber Warfare -- Defining the New Cyber Warfare -- A Short History of Cyber Conflict -- The Opening Cyber Salvos -- Web War I? The Cyber Attacks on Estonia -- Timeline of the Cyber Attacks on Estonia -- Determining Responsibility for the Cyber Attack on Estonia -- The Reaction of the United States to the Cyber Attacks on Estonia -- Cyber Deterrence -- The Use of Cyber Attacks in the 2008 Invasion of Georgia -- Stuxnet: The Cyber Shot Heard around the World -- Summary -- National Cybersecurity Strategies of the Cyber Powers -- United States -- United Kingdom -- China -- Russia -- Israel
  • Regional Cyber Defense: NATO Cybersecurity -- A Polycentric Approach to Securing Critical National Infrastructure -- 5 Risky Business -- Defining the Cyber Threat to the Private Sector -- The Trouble with Data -- Analyzing the Cyber Threat to the Private Sector -- How Often Do Cyber Attacks Affect the Private Sector? -- Which Industries are Being Targeted? -- Which Types of Attacks Occur Most Frequently? -- How Much Do Cyber Attacks Cost? -- Managing Uncertainty in the Cyber Threat Matrix -- Enhancing Cybersecurity through the Competitive Market -- Managing the Cyber Threat at Microsoft -- Cyber Insecurity: Proactive and Reactive Cybersecurity Strategies -- Technological and Budgetary Cybersecurity Best Practices -- Organizational Cybersecurity Best Practices: People and Processes -- Challenges to Corporate Cybersecurity -- Managing Market Imperfections through Market-Based Incentives and Regulatory Intervention -- Regulatory Intervention to Manage Cyber Attacks -- Cyber Risk Mitigation: Analyzing the Role of Cyber Risk Insurance in Enhancing Cybersecurity -- Public-Private Partnerships for Cybersecurity -- Summary -- Part III The Law, Politics, and Promise of Cyber Peace -- 6 An Introduction to the Law of Cyber War and Peace -- The Law of Cyber Peace -- A Brief Introduction to International Law -- Regulating Cyber Weapons through International Law -- Interwar Arms Control -- The Analogy of Nuclear War -- From the Digital Frontier to the Final Frontier: Arms Limitation in Space Law as an Analogy for Cyber War -- Freeze the Code: The Antarctic Treaty System Approach to Cyber Weapons -- Determining Liability for Cyber Attacks through International Communications and U.S. Cyber Law -- International Communications Law and Cyber Attacks -- U.S. Cyber Law Applied to Cyber Attacks
  • The Role of the Private Sector in Managing Cyber Attacks under International Law -- Analogizing Other Applicable Accords to Cyber Attacks -- Summary -- The Law of Cyber War -- State Responsibility for Cyber Attacks -- Cyber Attacks and Self-Defense -- The Intersections of International Humanitarian and Human Rights Law as Applied to Cybersecurity -- Applying the LOAC to Cyber Attacks -- Cyber Warfare, International Criminal Law, and Human Rights Law -- Summary -- 7 Cyber Peace -- Cyber Power and Politics in the Information Age -- Tweet Softly, but Carry a Big Stick: U.S. Cybersecurity Reform Efforts -- The Global Politics of Internet Reform -- The Future of Internet Governance -- The Rise of Polycentric Governance in Cyberspace -- Regime Effectiveness in Cyberspace -- Cybersecurity Best Practices -- Personal Cybersecurity -- Technical Cybersecurity -- Corporate Cybersecurity -- National Cybersecurity -- Toward Cyber Peace -- Conclusion -- Appendix -- Index
Dimensions
unknown
Extent
1 online resource (436 pages)
Form of item
online
Isbn
9781107347656
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Sound
unknown sound
Specific material designation
remote
System control number
  • (MiAaPQ)EBC1139663
  • (Au-PeEL)EBL1139663
  • (CaPaEBR)ebr10888057
  • (CaONFJC)MIL637857
  • (OCoLC)881886638

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...