Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310247071
Publisher: Progressive Management Publication: August 22, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310247071
Publisher: Progressive Management
Publication: August 22, 2014
Imprint: Smashwords Edition
Language: English

This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it. Our belief it that learning is most effective when concepts under consideration can be aligned with already-existing understanding or knowledge. Cyber issues are inherently tough to explain in layman's terms. The future is always open and undetermined, and the numbers of actors and the complexity of their relations are too great to give definitive guidance about future developments. In this report, historical analogies, carefully developed and properly applied, help indicate a direction for action by reducing complexity and making the future at least cognately manageable.

The Cyber Analogies Project was launched in 2012 to assist U.S. Cyber Command in identifying and developing relevant historical, economic, and other useful metaphors that could be used to enrich the discourse about cyber strategy, doctrine, and policy. The intent of the project is to provide useful insights, both for those with little technical background in or direct connection to cyberwar and cyber security and for those whose job it is to think about the spectrum of cyber-related issues every day. The project was conceived and carried out to help very senior, busy, responsible people understand topics and issues that are fast-moving and dynamic, and have potentially great consequences for society, security, and world affairs.

The President has identified the cyber security threat as one of the most serious we face as a nation. Events in cyberspace continue to accelerate, as both nation-states and non-state actors seek to exploit asymmetrical advantages in this virtual domain. The risks and costs of failing to act skillfully and effectively are likely to be widespread, cascading, and almost surely highly disruptive. Many small-scale attacks can be—and are being— prevented; but a major, mass-disruptive attack is a growing possibility against which current defenses are inadequate.

Cyber Analogies * The Cyber Pearl Harbor * Applying the Historical Lessons of Surprise Attack to the Cyber Domain: The Example of the United Kingdom * The Cyber Pearl Harbor Analogy: An Attacker's Perspective * "When the Urgency of Time and Circumstances Clearly Does Not Permit...": Redelegation in Nuclear and Cyber Scenarios * Comparing Airpower and Cyberpower * Active Cyber Defense: Applying Air Defense to the Cyber Domain * The Strategy of Economic Warfare: A Historical Case Study and Possible Analogy to Contemporary Cyber Warfare * Silicon Valley: Metaphor for Cybersecurity, Key to Understanding Innovation War * The Offense-Defense Balance and Cyber Warfare

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it. Our belief it that learning is most effective when concepts under consideration can be aligned with already-existing understanding or knowledge. Cyber issues are inherently tough to explain in layman's terms. The future is always open and undetermined, and the numbers of actors and the complexity of their relations are too great to give definitive guidance about future developments. In this report, historical analogies, carefully developed and properly applied, help indicate a direction for action by reducing complexity and making the future at least cognately manageable.

The Cyber Analogies Project was launched in 2012 to assist U.S. Cyber Command in identifying and developing relevant historical, economic, and other useful metaphors that could be used to enrich the discourse about cyber strategy, doctrine, and policy. The intent of the project is to provide useful insights, both for those with little technical background in or direct connection to cyberwar and cyber security and for those whose job it is to think about the spectrum of cyber-related issues every day. The project was conceived and carried out to help very senior, busy, responsible people understand topics and issues that are fast-moving and dynamic, and have potentially great consequences for society, security, and world affairs.

The President has identified the cyber security threat as one of the most serious we face as a nation. Events in cyberspace continue to accelerate, as both nation-states and non-state actors seek to exploit asymmetrical advantages in this virtual domain. The risks and costs of failing to act skillfully and effectively are likely to be widespread, cascading, and almost surely highly disruptive. Many small-scale attacks can be—and are being— prevented; but a major, mass-disruptive attack is a growing possibility against which current defenses are inadequate.

Cyber Analogies * The Cyber Pearl Harbor * Applying the Historical Lessons of Surprise Attack to the Cyber Domain: The Example of the United Kingdom * The Cyber Pearl Harbor Analogy: An Attacker's Perspective * "When the Urgency of Time and Circumstances Clearly Does Not Permit...": Redelegation in Nuclear and Cyber Scenarios * Comparing Airpower and Cyberpower * Active Cyber Defense: Applying Air Defense to the Cyber Domain * The Strategy of Economic Warfare: A Historical Case Study and Possible Analogy to Contemporary Cyber Warfare * Silicon Valley: Metaphor for Cybersecurity, Key to Understanding Innovation War * The Offense-Defense Balance and Cyber Warfare

More books from Progressive Management

Cover of the book Air Force Doctrine Document 3-59: Weather Operations - Principles, Air Force Combat Climatology Center (AFCCC), Space Weather Branch, History of Desert Storm and Operation Eagle Claw by Progressive Management
Cover of the book Bombing the European Axis Powers: A Historical Digest of the Combined Bomber Offensive, 1939-1945 - World War II, B-17, B-24, Bombing Germany and Italy by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Intraocular (Eye) Melanoma - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Space Support to Army Operations (FM 100-18) Defense Department Space Policy, Military Space Systems (Value-Added Professional Format Series) by Progressive Management
Cover of the book Memories of the Golden Age of American Space Flight (Mercury, Gemini, Apollo, Skylab) - Oral Histories of Managers, Engineers, and Workers (Set 3) - Including Maynard, George Mueller, Warren North by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force Intelligence - Force Protection (FP), Predictive Battlespace Awareness (PBA), Open Source Intelligence (OSINT), ISR, Contingency Unit by Progressive Management
Cover of the book 21st Century Textbooks of Military Medicine - Medical Aspects Of Biological Warfare - Anthrax, Ricin, Smallpox, Viral Fevers, Plague, Biosafety, Biosecurity (Emergency War Surgery Series) by Progressive Management
Cover of the book Ebola Guide: Infection Control for Viral Hemorrhagic Fevers (VHFs) in the African Health Care Setting (including Lassa Fever, Rift Valley Fever, Ebola, Marburg, Yellow Fever) - Isolation Precautions by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Tactics, Techniques, and Procedures for Biological Surveillance Field Manual - FM 3-11.86 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Arctic Scientific Research: Global Warming, Climate Change, Sea Ice Loss, Environmental Change, Human Health, Natural Resources, Civil Infrastructure, Indigenous Languages, Alaska, UNCLOS by Progressive Management
Cover of the book To Save a City: The Berlin Airlift 1948-1949 - Germany in Defeat after World War II, Marshall Plan, Pretext for Soviet Action, Global Logistics, Operation Vittles, Blockade Ends as Airlift Wins, NATO by Progressive Management
Cover of the book Art of War Paper: Survival Through Adaptation: The Chinese Red Army and the Extermination Campaigns, 1927-1936 - Late Qing to Early Republican China, Li Lisan Line, Bolsheviks by Progressive Management
Cover of the book Venture into Space: Early Years of Goddard Space Flight Center - Vanguard, Mercury Tracking, Explorer, Pioneer, Tiros, Telstar, Relay, Syncom Satellites (NASA SP-4301) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Opposing Force OPFOR Worldwide Equipment Guide (WEG) Part 7 - Ground Systems - Engineers, Mines, Command and Control, Information Warfare, Chemical, Biological, Nuclear by Progressive Management
Cover of the book 2014 Wildland Fire Incident Management Field Guide PMS 210 (Formerly Fireline Handbook PMS 410) - Firefighting Safety, Initial and Extended Attack, Pumps, Foam, Fireline Explosives, Tankers by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy