Book description
Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare.
The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks.
Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations, geopolitics, information technologies, etc.
Table of contents
- Cover
- Title Page
- Copyright
- Introduction
- List of Acronyms
-
Chapter 1. Cyberwar and its Borders
- 1.1. The seduction of cyberwar
- 1.2. Desirable, vulnerable and frightening information
- 1.3. Conflict and its dimensions
- 1.4. The Helm and space
- 1.5. Between knowledge and violence
- 1.6. Space, distance and paths
- 1.7. The permanency of war
- 1.8. No war without borders
- 1.9. The enemy and the sovereign
- 1.10. Strengths and weaknesses
- 1.11. Bibliography
-
Chapter 2. War of Meaning, Cyberwar and Democracies
- 2.1. Introduction
-
2.2. Informational environment, a new operating space for strategy
-
2.2.1. War and information: stakes for the West
- 2.2.1.1. Information society and 21st Century conflicts
- 2.2.1.2. Informational environment and cyberspace
- 2.2.1.3. Emergence of non-state controlled actors
- 2.2.1.4. The West perceived negatively by the non-western wor
- 2.2.1.5. A thought to be renewed on the concept of subversion
- 2.2.1.6. The debate on the use of force
- 2.2.1.7. The rejection of death in the West
- 2.2.1.8. Soldier-citizen and individual freedom of expression
-
2.2.2. Strategy in the information environment
- 2.2.2.1. The global nature of the State’s strategy in resolving crises
- 2.2.2.2. Comprehensive approach and military strategy
- 2.2.2.3. About the influence strategy of Western democracies
- 2.2.2.4. The return to ideologies
- 2.2.2.5. War of meaning and strategic communication
- 2.2.2.6. NATO and strategic communication(s) in Afghanistan
-
2.2.3. Winning the battle of legitimacies
- 2.2.3.1. Creating legitimacy out of a military intervention
- 2.2.3.2. The asymmetry of ethics
- 2.2.3.3. Why fight?
- 2.2.3.4. Necessary domestic adherence
- 2.2.3.5. Sensitizing domestic public opinion
- 2.2.3.6. What is propaganda today?
- 2.2.3.7. The Internet: new battlefield for propaganda
- 2.2.3.8. Communication or propaganda
-
2.2.1. War and information: stakes for the West
- 2.3. Influence strategy: defeating and limiting armed force physical involvement
- 2.4. Conclusion
- 2.5. Bibliography
- Chapter 3. Intelligence, the First Defense? Information Warfare and Strategic Surprise
-
Chapter 4. Cyberconflict: Stakes of Power
-
4.1. Stakes of power
- 4.1.1. Power relations
- 4.1.2. Expression of sovereignty
- 4.1.3. Cyberpower
- 4.1.4. Measuring and locating power
- 4.1.5. Limits of exercising power
- 4.1.6. The Monroe doctrine
- 4.1.7. Globalization
- 4.1.8. Shock theories
- 4.1.9. Naval and maritime power strategy
- 4.1.10. Air/space and cybernetic power: analogies
- 4.1.11. Cyberconflict/cyber weapons, chemical/biological weapons: comparisons
- 4.1.12. Cyberconflict/cyber weapons, Cold War, nuclear weapons: comparisons
- 4.1.13. Cyberconflict and new wars
- 4.2. The Stuxnet affair
- 4.3. Bibliography
-
4.1. Stakes of power
-
Chapter 5. Operational Aspects of a Cyberattack: Intelligence, Planning and Conduct
- 5.1. Introduction
- 5.2. Towards a broader concept of cyberwar
- 5.3. Concept of critical infrastructure
- 5.4. Different phases of a cyberattack
- 5.5. A few “elementary building blocks”
- 5.6. Example scenario
- 5.7. Conclusion
- 5.8. Bibliography
-
Chapter 6. Riots in Xinjiang and Chinese Information Warfare? 285
- 6.1. Xinjiang region: an explosive context
- 6.2. Riots, July 2009
-
6.3. Impacts on Chinese cyberspace: hacktivism and site defacing
- 6.3.1. The Internet in Xinjiang: a region dependent on information systems?
- 6.3.2. Website defacement in a crisis context
-
6.3.3. Defining the dynamics of the relationship between “political events” and “site defacement”
- 6.3.3.1. Defacements on the .cn domain
- 6.3.3.2. Defacements on .hk domains
- 6.3.3.3. Defacements on the .tw domain
- 6.3.3.4. Defacements on the .mo domain
- 6.3.3.5. Defacements on the .tr domain
- 6.3.3.6. Defacements on the .jp domain
- 6.3.3.7. Defacements on the .au domain
- 6.3.3.8. Involved hacktivists
- 6.3.3.9. Content of the claims
- 6.4. Managing the “cyberspace” risk by the Chinese authorities
- 6.5. Chinese information warfare through the Xinjiang crisis
- 6.6. Conclusion
- 6.7. Bibliography
- Chapter 7. Special Territories
- Conclusion
- List of Authors
- Index
Product information
- Title: Cyberwar and Information Warfare
- Author(s):
- Release date: August 2011
- Publisher(s): Wiley
- ISBN: 9781848213043
You might also like
book
97 Things Every Information Security Professional Should Know
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …
book
Mastering Cyber Intelligence
Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …