ebook img

Security in Cyberspace: Targeting Nations, Infrastructures, Individuals PDF

262 Pages·2014·2.058 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security in Cyberspace: Targeting Nations, Infrastructures, Individuals

Security in Cyberspace Security in Cyberspace Targeting Nations, Infrastructures, Individuals Edited by Giampiero Giacomello Bloomsbury Academic An imprint of Bloomsbury Publishing Inc Bloomsbury Academic An imprint of Bloomsbury Publishing Inc 1385 Broadway 50 Bedford Square New York London NY 10018 WC1B 3DP USA UK www.bloomsbury.com BLOOMSBURY and the Diana logo are trademarks of Bloomsbury Publishing Plc First published 2014 Paperback edition fi rst published 2016 © Giampiero Giacomello and contributors, 2014 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage or retrieval system, without prior permission in writing from the publishers. No responsibility for loss caused to any individual or organization acting on or refraining from action as a result of the material in this publication can be accepted by Bloomsbury or the author. Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the Library of Congress. ISBN: HB: 978-1-6235-6803-0 PB: 978-1-5013-1729-3 ePub: 978-1-6235-6699-9 ePDF: 978-1-6235-6570-1 Typeset by Fakenham Prepress Solutions, Fakenham, Norfolk NR21 8NN Printed and bound in Great Britain To Angela, Jacopo and Emma Michela Contents List of Abbreviations viii List of Figures and Tables xiv Acknowledgements xv Foreword Carlo Schaerf xvi List of Contributors xx Introduction: Security in Cyberspace Giampiero Giacomello 1 Part 1 The Nation 1 The ‘State(s)’ of Cybersecurity Rossella Mattioli 23 2 Reducing Uncertainties in Cyberspace through Confidence and Capacity-Building Measures Patryk Pawlak 39 3 WikiLeaks and State Control of Information in the Cyber Age Judith Reppy 59 4 Leaks: Secure Communications and Achieving Nuclear Zero Bruce D. Larkin 83 5 Establishing Norms of Behaviour in Cyberspace: The Chinese Viewpoint Chunmei Kang 113 Part 2 The Infrastructure and The Individual 6 Einstein on the Breach: Surveillance Technology, Cybersecurity and Organizational Change Andreas Kuehn and Milton Mueller 127 7 Artificial or ‘Legitimate’ Barriers to Internet Governance? Francesco Giacomini and Laura Cordani 161 8 Public-Private Partnerships: A ‘Soft’ Approach to Cybersecurity? Views from the European Union Maria Grazia Porcedda 183 9 Being Publicly Private: Extreme Nationalist User Practices on Social Networks Andra Siibak 213 Index 229 List of Abbreviations ACLU American Civil Liberties Union ACTA Anti-Counterfeiting Trade Agreement APT Advanced Persistent Threats ARF ASEAN Regional Forum AS Autonomous Systems ASEAN Association of Southeast Asian Nations BBC British Broadcasting Corporation BGP Border Gateway Protocol BT British Telecom C&C Command-and-Control CBS Columbia Broadcasting System CBMS Confidence Building Measures CCBMS Civil Confidence Building Measures CD-RW Readable and [re]Writable Compact Disk CEO Consumer Electronics Association CERT Computer Emergency Response Team CESG Communications-Electronics Security Group CIA Central Intelligence Agency CI Critical Infrastructure CII Critical Information Infrastructure CIIP Critical Information Infrastructure Protection List of Abbreviations ix CISPA Cyber Intelligence Sharing and Protection Act CNCI Comprehensive National Cybersecurity Initiative CNCERT National Computer Network Emergency Technical Team Coordination Center CNO Computer Network Operations CS/IA Cybersecurity/Information Assurance CSBMS Confidence and Security Building Measures CSDP Common Security and Defence Policy CSIS Canadian Security Intelligence Service CSO Chief Security Officer CSP Commercial Service Providers DCM Deputy Chief of Mission DDOS Distributed Denial of Service DECS DIB Enhanced Cybersecurity Services DHS Department of Homeland Security DIB Defence Industrial Base DMCA Digital Millennium Copyright Act DNS Domain Name System DNSEC Domain Name System Security Extensions DOD Department of Defence DPD Data Protection Directive DPI Deep Packet Inspection DRM Digital Rights Management EC3 European Cybercrime Center EC European Community

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.