logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Strategic Cyber Security Geers K

  • SKU: BELL-6328830
Strategic Cyber Security Geers K
$ 31.00 $ 45.00 (-31%)

4.4

22 reviews

Strategic Cyber Security Geers K instant download after payment.

Publisher: NATO Cooperative Cyber Defence Centre of Excellence (CCDOE)
File Extension: PDF
File size: 2.65 MB
Pages: 169
Author: Geers K.
ISBN: 9789949904051, 9789949904068, 9789949904075, 9949904056, 9949904064, 9949904072
Language: English
Year: 2011

Product desciption

Strategic Cyber Security Geers K by Geers K. 9789949904051, 9789949904068, 9789949904075, 9949904056, 9949904064, 9949904072 instant download after payment.

NATO Cooperative Cyber Defence Centre of Excellence, 2011. 169 p.This book argues that computer security has evolved from a technical discipline to a strategic concept. The world’s growing dependence on a powerful but vulnerable Internet – combined with the disruptive capabilities of cyber attackers – now threatens national and international security.
Strategic challenges require strategic solutions. The author examines four nation-state approaches to cyber attack mitigation: Internet Protocol version 6 (IPv6), Sun Tzu’s Art of War, Cyber attack deterrence, Cyber arms control.
The four threat mitigation strategies fall into several categories. IPv6 is a technical solution. Art of War is military. The third and fourth strategies are hybrid: deterrence is a mix of military and political considerations; arms control is a political/technical approach.
The Decision Making Trial and Evaluation Laboratory (DEMATEL) is used to place the key research concepts into an influence matrix. DEMATEL analysis demonstrates that IPv6 is currently the most likely of the four examined strategies to improve a nation’s cyber defense posture.
There are two primary reasons why IPv6 scores well in this research. First, as a technology, IPv6 is more resistant to outside influence than the other proposed strategies, particularly deterrence and arms control, which should make it a more reliable investment. Second, IPv6 addresses the most significant advantage of cyber attackers today – anonymity.INTRODUCTION
Cyber Security and National Security
BIRTH OF A CONCEPT: STRATEGIC CYBER SECURITY
Cyber Security: A Short History
Cyber Security: A Technical Primer
Cyber Security: Real-World Impact
NATION-STATE CYBER ATTACK MITIGATION STRATEGIES
Next Generation Internet: Is IPv6 the Answer? Sun Tzu: Can Our Best Military Doctrine Encompass Cyber War?
Deterrence: Can We Prevent Cyber Attacks?
Arms Control: Can We Limit Cyber Weapons?
DATA ANALYSIS AND RESEARCH RESULTS
DEMATEL and Strategic Analysis
Key Findings
CONCLUSIONISBN 978-9949-9040-7-5 (pdf)

Related Products