Download

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 1 MB Best for desktop computers.

Use Adobe Acrobat Reader version 10 or higher for the best experience.

ePub file 2.7 MB Best for mobile devices.

On desktop computers and some mobile devices, you may need to download an eBook reader to view ePub files. Calibre is an example of a free and open source e-book library management application.

mobi file 0.9 MB Best for Kindle 1-3.

On desktop computers and some mobile devices, you may need to download an eBook reader to view mobi files. Amazon Kindle is the most popular reader for mobi files.

Summary Only

FormatFile SizeNotes
PDF file 0.2 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Purchase

Purchase Print Copy

 FormatList Price Price
Add to Cart Paperback238 pages $33.00 $26.40 20% Web Discount

The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for the money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading. Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. Cyberwar is nothing so much as the manipulation of ambiguity. The author explores these topics in detail and uses the results to address such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions the United States and the U.S. Air Force can take to protect itself in the face of deliberate cyberattack.

Table of Contents

  • Chapter One

    Introduction

  • Chapter Two

    A Conceptual Framework

  • Chapter Three

    Why Cyberdeterrence Is Different

  • Chapter Four

    Why the Purpose of the Original Cyberattack Matters

  • Chapter Five

    A Strategy of Response

  • Chapter Six

    Strategic Cyberwar

  • Chapter Seven

    Operational Cyberwar

  • Chapter Eight

    Cyberdefense

  • Chapter Nine

    Tricky Terrain

  • Appendix A

    What Constitutes an Act of War in Cyberspace?

  • Appendix B

    The Calculus of Explicit Versus Implicit Deterrence

  • Appendix C

    The Dim Prospects for Cyber Arms Control

Research conducted by

The research described in this report was sponsored by the United States Air Force and conducted by RAND Project AIR FORCE.

This report is part of the RAND Corporation Monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.