Author: | Progressive Management | ISBN: | 9781311258038 |
Publisher: | Progressive Management | Publication: | March 27, 2016 |
Imprint: | Smashwords Edition | Language: | English |
Author: | Progressive Management |
ISBN: | 9781311258038 |
Publisher: | Progressive Management |
Publication: | March 27, 2016 |
Imprint: | Smashwords Edition |
Language: | English |
Professionally converted for accurate flowing-text e-book format reproduction, this unique study analyzes and explores the unique position that NATO operates in and the duty of NATO to protect its alliance members, and member states to protect each other. Topics discussed include how cyber-attacks are defined and identified, the particular challenges of NATO when addressing cyber-attacks, the severity of cyber-attacks, and what would need to occur in order for a victim-state to ask NATO to invoke Article 5.
This thesis discusses the readiness of NATO to respond to a cyber-attack and what the conditions necessary for an Article 5 response, and what that response would potentially look like. Finally, this work provides recommendations for actions that NATO could take to both prevent and confront cyber attacks.
CHAPTER I * INTRODUCTION * A. DEFINE THE PROBLEM * B. OVERVIEW * C. THESIS PROPOSAL QUESTIONS * D. METHODOLOGY * E. THESIS ORGANIZATION * CHAPTER II * LITERATURE REVIEW * CHAPTER III * NATO * A. HISTORY OF NATO * B. NATO AND THE TALLINN MANUAL * C. ARTICLES 4 AND 5, AND THE SEPTEMBER 11, 2001 ATTACKS * CHAPTER IV * CYBER-ATTACKS * A. WHAT IS A CYBER-ATTACK? * B. MAJOR INTERNATIONAL CYBER-ATTACKS * C. NATO AND THE PROBLEM WITH CYBER-ATTACKS * CHAPTER V * NATO AND CYBER-ATTACKS * A. IS NATO PREPARED TO RESPOND TO A CYBER-ATTACK?. * B. UNDER WHAT CONDITIONS WOULD A CYBER-ATTACK TRIGGER AN ARTICLE 5 RESPONSE? * C. HOW WOULD NATO RESPOND TO A CYBER-ATTACK UNDER ARTICLE 5? * D. HOW SHOULD NATO RESPOND TO A CYBER-ATTACK AGAINST A MEMBER COUNTRY? . * CHAPTER VI * CONCLUSION * A. RECOMMENDATIONS * B. CONCLUSION * C. AREAS OF AGREEMENT AND UNDERSTANDING * D. UNRESOLVED ISSUES * LIST OF REFERENCES
Professionally converted for accurate flowing-text e-book format reproduction, this unique study analyzes and explores the unique position that NATO operates in and the duty of NATO to protect its alliance members, and member states to protect each other. Topics discussed include how cyber-attacks are defined and identified, the particular challenges of NATO when addressing cyber-attacks, the severity of cyber-attacks, and what would need to occur in order for a victim-state to ask NATO to invoke Article 5.
This thesis discusses the readiness of NATO to respond to a cyber-attack and what the conditions necessary for an Article 5 response, and what that response would potentially look like. Finally, this work provides recommendations for actions that NATO could take to both prevent and confront cyber attacks.
CHAPTER I * INTRODUCTION * A. DEFINE THE PROBLEM * B. OVERVIEW * C. THESIS PROPOSAL QUESTIONS * D. METHODOLOGY * E. THESIS ORGANIZATION * CHAPTER II * LITERATURE REVIEW * CHAPTER III * NATO * A. HISTORY OF NATO * B. NATO AND THE TALLINN MANUAL * C. ARTICLES 4 AND 5, AND THE SEPTEMBER 11, 2001 ATTACKS * CHAPTER IV * CYBER-ATTACKS * A. WHAT IS A CYBER-ATTACK? * B. MAJOR INTERNATIONAL CYBER-ATTACKS * C. NATO AND THE PROBLEM WITH CYBER-ATTACKS * CHAPTER V * NATO AND CYBER-ATTACKS * A. IS NATO PREPARED TO RESPOND TO A CYBER-ATTACK?. * B. UNDER WHAT CONDITIONS WOULD A CYBER-ATTACK TRIGGER AN ARTICLE 5 RESPONSE? * C. HOW WOULD NATO RESPOND TO A CYBER-ATTACK UNDER ARTICLE 5? * D. HOW SHOULD NATO RESPOND TO A CYBER-ATTACK AGAINST A MEMBER COUNTRY? . * CHAPTER VI * CONCLUSION * A. RECOMMENDATIONS * B. CONCLUSION * C. AREAS OF AGREEMENT AND UNDERSTANDING * D. UNRESOLVED ISSUES * LIST OF REFERENCES