News Release
U.S. Must Focus on Protecting Critical Computer Networks from Cyber Attack
Oct 8, 2009
Format | File Size | Notes |
---|---|---|
PDF file | 1 MB | Best for desktop computers. Use Adobe Acrobat Reader version 10 or higher for the best experience. |
ePub file | 2.7 MB | Best for mobile devices. On desktop computers and some mobile devices, you may need to download an eBook reader to view ePub files. Calibre is an example of a free and open source e-book library management application. |
mobi file | 0.9 MB | Best for Kindle 1-3. On desktop computers and some mobile devices, you may need to download an eBook reader to view mobi files. Amazon Kindle is the most popular reader for mobi files. |
Format | File Size | Notes |
---|---|---|
PDF file | 0.2 MB | Use Adobe Acrobat Reader version 10 or higher for the best experience. |
Format | List Price | Price | |
---|---|---|---|
Add to Cart | Paperback238 pages | $33.00 | $26.40 20% Web Discount |
The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for the money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading. Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. Cyberwar is nothing so much as the manipulation of ambiguity. The author explores these topics in detail and uses the results to address such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions the United States and the U.S. Air Force can take to protect itself in the face of deliberate cyberattack.
Chapter One
Introduction
Chapter Two
A Conceptual Framework
Chapter Three
Why Cyberdeterrence Is Different
Chapter Four
Why the Purpose of the Original Cyberattack Matters
Chapter Five
A Strategy of Response
Chapter Six
Strategic Cyberwar
Chapter Seven
Operational Cyberwar
Chapter Eight
Cyberdefense
Chapter Nine
Tricky Terrain
Appendix A
What Constitutes an Act of War in Cyberspace?
Appendix B
The Calculus of Explicit Versus Implicit Deterrence
Appendix C
The Dim Prospects for Cyber Arms Control
The research described in this report was sponsored by the United States Air Force and conducted by RAND Project AIR FORCE.
This report is part of the RAND Corporation Monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.