Oxford Handbook of Cyber Security

Oxford Handbook of Cyber Security

Cornish, Paul

Oxford University Press

11/2021

890

Dura

Inglês

9780198800682

15 a 20 dias

1672

Descrição não disponível.
Sir David Omand GCB: Foreword
Paul Cornish: Introduction
PART I. Cyber Space: What it is and Why it Matters
1: David Pym: The Origins of Cyberspace
2: Greg Austin: Opportunity, Threat and Dependency in the Social Infosphere
3: Madeline Carr: A Political History of Cyberspace
4: Camino Kavanagh and Tim Stevens: Cyber Power in International Relations
5: Onora O Neill: Ethical Standards and 'Communication' Technologies
PART II. Security in Cyber Space: Cyber Crime
6: Roderic Broadhurst: Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace
7: Claire Vishik, Marcello Balduccini, Michael Huth, and Lawrence John: Making Sense of Cybersecurity in Emerging Technology Areas
8: Eva Ignatuschtschenko: Assessing Harm from Cyber Crime
9: Jose Eduardo Malta de Sa Brandao: Toward a Vulnerability Mitigation Model.
PART III. Security in Cyber Space: Extremism and Terrorism
10: Alexander Corbeil and Rafal Rohozinski: Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space
11: Sandro Gaycken: Cyberweapons
12: Florian Egloff: Intentions and Cyberterrorism
13: Caitriona Heinl: Technology: Access and Denial
PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
14: Jon Lindsay: Cyber Espionage
15: Ben Buchanan: Cyberwar Redux
16: Herbert Lin and Jaclyn Kerr: On Cyber-Enabled Information Warfare and Information Operations
17: Paul Cornish: The Deterrence and Prevention of Cyber Conflict
PART V. Technical and Corporate Cyber Security
18: Nicole van der Meulen: Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem
19: Stuart Murdoch: Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future
20: Fred Cate and Rachel Dockery: Data Privacy and Security Law
21: Mike Steinmetz: The Insider Threat and the Insider Advocate
PART VI. Personal Cyber Security
22: Dave Clemente: Personal Protection: Cyber Hygiene
23: John Carr: Online Child Safety
24: Roger Bradbury: Educating for Cyber Security
25: Jonathon Penney: Cyber Security, Human Rights and Empiricism: The Case of Digital Surveillance
PART VII. National Cyber Security
26: David Mussington: Securing the Critical National Infrastructure
27: Mika Kerttunen: The Role of Defence in National Cyber Security
28: Lara Pace and Paul Cornish: Cyber Security Capacity Building
PART VIII. Global Trade and Cyber Security
29: Elaine Korzak: Cyber Security, Multilateral Export Control, and Standard Setting Arrangements
30: David Fidler: Cyber Security, Global Commerce, and International Organisations
31: Franz-Stefan Gady and Greg Austin: Global Trade and Cyber Security: Monitoring, Enforcement, and Sanctions
PART IX. International Cyber Security
32: Nigel Inkster: Semi-Formal Diplomacy: Track 1.5 and Track 2
33: Tim Maurer: States, Proxies, and (Remote) Offensive Cyber Operations
34: Melissa Hathaway: Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice
35: Thomas Wingfield and Harry Wingo: International Law for Cyber Space: Competition and Conflict
PART X. Perspectives on Cyber Security
36: Tang Lan: Community of Common Future in Cyberspace: The Proposal and Practice of China
37: Arun Mohan Sukumar: Look West or Look Easta India at the Crossroads of Cyberspace
38: Lior Tabansky: Cybersecurity in Israel: Organisation and Future Challenges
39: Yoko Nitta: The Evolving Concept of the Japanese Security Strategy
40: Elina Noor: Contextualizing Malaysia's Cybersecurity Agenda
41: Anton Shingarev and Anastasya Kazakova: The Russian Federation s Approach to Cyber Security
PART XI. Future Challenges
42: Joelle Webb: Rethinking the Governance of Technology in the Digital Age
43: Caitriona Heinl: Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes
44: Debi Ashenden: The Future Human and Behavioural Challenges of Cyber Security
45: Chris Demchak: The Future of Democratic Civil Societies in a Post-Western Cybered Era
46: Eneken Tikk: Future Normative Challenges
47: Tim Unwin: Cybersecurity' and 'Development': Contested Futures
48: Mike Steinmetz: Project Solarium 1953 and the Cyberspace Solarium Commission 2019
Paul Cornish: Conclusion
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.