Russian cyber operations : coding the boundaries of conflict / Scott Jasper ; foreword by Gen. Keith Alexander, USA (Ret.).

By: Jasper, Scott [author.]Material type: TextTextSeries: JSTOR eBooksPublisher: Washington, DC : Georgetown University Press, [2020]Description: 1 online resource (xvi, 214 pages) : illustrations, mapsContent type: text Media type: computer Carrier type: online resourceISBN: 1626167990; 9781626167995Subject(s): Cyberspace operations (Military science) -- Russia (Federation) | Information warfare -- Russia (Federation) | Hybrid warfare -- Russia (Federation) | Asymmetric warfare -- Russia (Federation) | Cyber intelligence (Computer security) -- United States | Computer security -- United StatesGenre/Form: Electronic books.Additional physical formats: Print version:: Russian cyber operationsDDC classification: 355.4/1 LOC classification: U167.5.C92 | J375 2020Online resources: Click here to view this ebook.
Contents:
Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion.
Summary: "Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
U167.5.C92 J375 2020 (Browse shelf) https://ezproxy.uttyler.edu/login?url=https://www.jstor.org/stable/10.2307/j.ctv1169bjk Available on1119747163

Includes bibliographical references and index.

Analytical Framework -- Asymmetric Arsenal Tool -- Hybrid Warfare Element -- Information Warfare Component -- Rational State Behavior -- Unconvincing Responses -- Current Security Measures -- Automated Cyber Defense -- Technical Offset Strategy -- Conclusion.

"Russia's brazen use of cyber operations to interfere in elections, conduct information warfare, and as part of its ongoing conflicts with neighboring states has made international headlines. However they have also maintained a thin veneer of deniability and have avoided clear red lines that would be widely accepted as acts of war. While cyber operations possess the means to achieve mischievous, subversive, and potentially destructive effects, how is an injured state supposed to respond? Scott Jasper seeks to bring clarity to this problem by undertaking an in-depth look at the legal and technical aspects of actual Russian cyber operations. He puts Russia's use of cyber in the context of their military and information warfare doctrines and looks at examples from the 2016 US presidential election, the 2017 NotPetya mock ransomware attack, the 2017 French presidential election, and many more. Jasper proposes deterrence, defense, resilience, and cost-imposition responses and offsetting strategies for the United States and other states who have been on the receiving end of these attacks. This book will make a major contribution to helping scholars, students, and the national security community understand Russian cyber competition and how to respond"-- Provided by publisher.

Description based on online resource; title from digital title page (viewed on May 19, 2020).

There are no comments on this title.

to post a comment.