000 | a | ||
---|---|---|---|
999 |
_c33626 _d33626 |
||
008 | 250306b xxu||||| |||| 00| 0 eng d | ||
020 | _a9781009308588 | ||
082 |
_a363.325 _bREV |
||
100 | _aReveron, Derek S. | ||
245 | _aSecurity in the cyber age : an introduction to policy and technology | ||
260 |
_bCambridge University Press, _c2024 _aCambridge : |
||
300 |
_axviii, 393 p. ; _bill., _c23 cm |
||
365 |
_b26.99 _c£ _d111.30 |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _aCyberspace is essential for socializing, learning, shopping, and just about everything in modern life. Yet, there is also a dark side to cyberspace: sub-national, transnational, and international actors are challenging the ability of sovereign governments to provide a secure environment for their citizens. Criminal groups hold businesses and local governments hostage through ransomware, foreign intelligence services steal intellectual property and conduct influence operations, governments attempt to rewrite Internet protocols to facilitate censorship, and militaries prepare to use cyberspace operations in wars. Security in the Cyber Age breaks-down how cyberspace works, analyzes how state and non-state actors exploit vulnerabilities in cyberspace, and provides ways to improve cybersecurity. Written by a computer scientist and national security scholar-practitioner, the book offers technological, policy, and ethical ways to protect cyberspace. Its interdisciplinary approach and engaging style make the book accessible to the lay audience as well as computer science and political science students. | ||
650 | _aCyberinfrastructure | ||
650 | _aSecurity measures | ||
650 | _aCyberterrorism | ||
650 | _aCyberterrorism Risk assessment | ||
650 | _aInformational works | ||
650 | _aInternet Security measures | ||
650 | _aARPANET | ||
650 | _aDenial-of-service attacks | ||
650 | _a Internet governance | ||
700 | _aSavage, John E. | ||
942 |
_2ddc _cBK |