Cyber Warfare: China’s Strategy to Dominate in Cyber Space (Computer Hacking and Security)

Amazon Price: $17.95 $17.95 (as of February 15, 2019 01:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China‘s INEW doctrine combining network attack with electronic warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with unique network attack, exploitation, and defense capabilities. IW unit training focuses on improving network attack skills during military exercises. The integration of the IW militia units with commercial technology companies provides infrastructure and technical support enabling the units to conduct operations. The IW units gather intelligence on an adversary‘s networks identifying critical nodes and security weaknesses. Armed with this intelligence, these units are capable of conducting network attack to disrupt or destroy the identified critical nodes of an enemy‘s C4ISR assets allowing China to use military force in a local war. In an effort to regain its former status, China pursues the strategic goal of reunification of its claimed sovereign territories and lands using economic influence as the primary means but will resort to military force if necessary. Recent cyber activities attributed to China suggest that network exploitation is currently underway and providing military, political, and economic information to the CCP. Domestically and internationally, China views Taiwan and the United States respectively as the major threats to the CCP.

Cyber Infrastructure Protection

Rating: 
Amazon Price: $16.95 $16.95 (as of February 15, 2019 22:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a road map for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.

Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks

Rating: 
Amazon Price: N/A (as of February 15, 2019 20:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyberattacks are one of the greatest fears for governments and the private sector. The attacks come without warning and can be extremely costly and embarrassing.

Robert Mandel offers a unique and comprehensive strategic vision for how governments, in partnership with the private sector, can deter cyberattacks from both nonstate and state actors. Cyberdeterrence must be different from conventional military or nuclear deterrence, which are mainly based on dissuading an attack by forcing the aggressor to face unacceptable costs. In the cyber realm, where attributing a specific attack to a specific actor is extremely difficult, conventional deterrence principles are not enough. Mandel argues that cyberdeterrence must alter a potential attacker’s decision calculus by not only raising costs for the attacker but also by limiting the prospects for gain. Cyberdeterrence must also involve indirect unorthodox restraints, such as exposure to negative blowback and deceptive diversionary measures, and cross-domain measures rather than just retaliation in kind.
Continue reading “Optimizing Cyberdeterrence: A Comprehensive Strategy for Preventing Foreign Cyberattacks”

Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain

Amazon Price: $19.95 $19.95 (as of February 15, 2019 15:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This report assesses current (public domain) cyber security practices with respect to cyber indications and warnings. The information collected is in preparation for evaluation of the advantages of applying HPC technology to cybersecurity, as well as to identify other advances required to properly address this problem space.

Cybersecurity Information Sharing Act of 2015

Amazon Price: $12.95 $12.95 (as of February 15, 2019 23:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Over the last several years, the Committee has listened with increasing alarm to the testimony of senior intelligence officials and private sector experts about the growing cybersecurity threats to our nation. The Committee has already seen the impact these threats are having on the nation's security and its economy as losses to consumers, businesses, and the government from cyber attacks, penetrations, and disruptions already total billions of dollars. Beyond direct monetary losses, the continuing efforts of foreign actors to steal intellectual property will have far reaching impacts on the innovation upon which a robust economy and strong military relies. The Committee has seen widespread theft through cyberspace increasingly evolve into disruptive and destructive attacks. Our nation is growing more vulnerable to cyber threats. Every aspect of society is growing more dependent on computers which are all linked to networks, opening this country up to many known vulnerabilities and many yet to be discovered.