October 2013
Intermediate to advanced
324 pages
12h 10m
English
As cyber crime continues to increase in both frequency and gravity, numerous countries around the world—including the United States, China, Estonia, the United Kingdom, France, Japan, and South and North Korea—are developing strategies and capabilities designed to protect their IT infrastructures from dangerous vulnerabilities. As part of their efforts, they are developing cyber doctrines that are similar in many ways to traditional military doctrines. This chapter explores the state of cyber warfare doctrines today and examines some of the traditional tactics and products that the military must adapt to the cyberspace environment. In addition to covering some of the directives used by federal agencies and ...