Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Daniel Ventre
Cyber Conflict: Competing National Perspectives
Title Page
Copyright
Introduction
Chapter 1: Canada's Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy
1.1. Introduction
1.2. Canada in North America: sovereign but subordinate?
1.3. Counter-terrorism for the improvement of national security
1.4. The long path to a national CI protection strategy and national cyber security strategy
1.5. The adoption of the current strategies for CI protection and cyber security
1.6. Conclusion
1.7. Bibliography
1.7.1. Scientific and media articles
1.7.2. Primary Data
1.7.3. Websites
Chapter 2: Cuba: Towards an Active Cyber-defense
2.1. Cyberspace: statistics and history
2.1.1. The marginalization of Cuba
2.1.2. Cuban cyberspace as the target of attacks
2.2. Theoretical and practical considerations on information warfare and cyber-warfare
2.2.1. Development of capabilities
2.3. Cyber-warfare theories and practices
2.3.1. Fidel Castro's discourse
2.3.2. The concept of active cyber-defense
2.4. Regulations and ways around them
2.4.1. The State's influence over cyberspace
2.4.2. Getting around the restrictions
2.5. Capabilities of control, surveillance and interception
2.6. Enemies
2.7. Conclusion
2.8. Bibliography
Chapter 3: French Perspectives on Cyber-conflict
3.1. Cyberspace
3.2. Assessments, view on the world and awakening
3.2.1. Attacks
3.2.2. The feeling of insecurity, the threat
3.2.3. Potential vulnerabilities of States
3.2.4. Evolution of the international environment
3.3. Reaction, position of France and choice: theories, political strategies and military doctrines
3.3.1. Information: a powerful weapon for those controlling it
3.3.2. Media information: beneficial if controlled
3.3.3. Economic information as power, if controlled
3.3.4. Information warfare
3.3.5. Information warfare or information control
3.3.6. The ANSSI
3.3.7. Cyber-security and cyber-defense
3.3.8. Army: Information operations, NEB (numérisation de l'espace de bataille/digitization of battlespace), info-development
3.3.8.1. The temple of information operations
3.3.8.2. Battlespace digitization
3.3.8.3. Info-valorization
3.3.8.4. Cyber-war
3.3.8.5. Military point of views
3.3.9. Cyber-war and other modalities of the cyber-conflict
3.3.9.1. Cyber-war
3.3.9.2. CID
3.4. Conclusion
3.5. Bibliography
Chapter 4: Digital Sparta: Information Operations and Cyber-warfare in Greece
4.1. Geopolitical significance
4.2. Strategic concerns and internal balancing
4.3. Formative experiences in information operations: the Ergenekon conspiracy
4.4. Formative experiences in information operations: intensifying cyber-attacks
4.5. Formative experiences in information operations: the Öcalan affair
4.6. Formative experiences in information operations: the Greek wiretapping case of 20042005
4.7. Emerging civilian information operations strategies
4.8. Emerging military information operations strategies
4.9. The European Union dimension in Greek information operations
4.10. Conclusion
4.11. Bibliography
Chapter 5: Moving Toward an Italian Cyber Defense and Security Strategy
5.1. Information warfare and cyber warfare: what are they?
5.2. Understanding the current Italian geopolitical context
5.3. The Italian legal and organizational framework
5.4. The need for a national cyber-defense and -security strategy
5.5. Conclusion
5.6. Bibliography
Chapter 6: Cyberspace in Japan's New Defense Strategy
6.1. Japan's defense policy
6.2. Cyberspace in Japan's defense strategy
6.2.1. The context
6.2.1.1. Cyberspace and Japan
6.2.1.2. Japan as a victim of cyber-attacks
6.2.2. Cyberspace in security and defense policies
6.2.2.1. Cyberspace
6.2.2.2. Cyber-attacks
6.2.2.3. Cyber-defense
6.2.2.4. Cyber-warfare
6.2.2.5. Mobility, reactivity, rapidity, technology, intelligence, surveillance and reconnaissance capabilities
6.3. Conclusion
6.4. Bibliography
Chapter 7: Singapore's Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements
7.1. Singapore: electronic globalization and its pitfalls
7.2. Cyberdefence in the private sector and society at large
7.3. The Singapore Armed Forces and the embrace of third-generation warfare
7.3.1. Force multiplication
7.3.2. Continually revitalizing existing conventional arms capabilities
7.3.3. Generating asymmetrical advantages in operational transparency
7.4. Conclusion
7.5. Bibliography
Chapter 8: A Slovenian Perspective on Cyber Warfare
8.1. Introduction
8.2. Preparations for digital warfare
8.3. Specifics of technologically-advanced small countries
8.4. Geostrategic, geopolitics and the economic position of the Republic of Slovenia
8.5. Information and communication development in Slovenia
8.6. Cyber-threats in Slovenia
8.7. Slovenia in the field of information and communication security policy
8.8. Slovenia's information and communication security policy strategy
8.8.1. The EU information and communication security policy
8.8.2. NATO's information and communications security policy
8.8.3. Slovenia's information and communication security policy
8.8.4. Analysis of key strategic documents regulating the field of information and communication security policy in the Republic of Slovenia
8.8.5. National bodies that govern the field of information and communication security policy in the Republic of Slovenia
8.8.6. Directorate for information society (Ministry of Higher Education, Science and Technology)
8.8.7. Slovenian Computer Emergency Response Team
8.8.8. Directorate of e-Government and Administrative Processes (Ministry of Public Administration)
8.8.9. Office of the Government of the Republic of Slovenia for the Protection of Classified Information
8.8.10. Slovenian Intelligence and Security Agency
8.8.11. National Center for Crisis Management
8.9. Conclusion
8.10. Bibliography
Chapter 9: A South African Perspective on Information Warfare and Cyber Warfare
9.1. The South African structure of information warfare
9.2. A South African perspective on cyber-warfare
9.3. The Southern African cyber-environment
9.4. Legislation
9.5. Cyber-security and information warfare organizations in South Africa
9.6. Estimated cyber-warfare capability in Africa
9.7. Conclusion
9.8. Bibliography
Chapter 10: Conclusion
10.1. Cyberspace
10.2. Bibliography
List of Authors
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Cyber Conflict
,
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset