LEADER 03348nam 2200637 450 001 9910787038503321 005 20230803205433.0 010 $a1-62616-113-5 035 $a(CKB)3710000000250818 035 $a(EBL)1810129 035 $a(SSID)ssj0001349772 035 $a(PQKBManifestationID)11860917 035 $a(PQKBTitleCode)TC0001349772 035 $a(PQKBWorkID)11402790 035 $a(PQKB)10088545 035 $a(MiAaPQ)EBC1810129 035 $a(OCoLC)892430303 035 $a(MdBmJHUP)muse37564 035 $a(Au-PeEL)EBL1810129 035 $a(CaPaEBR)ebr10945252 035 $a(EXLCZ)993710000000250818 100 $a20141008h20142014 uy 0 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 10$aCyber blockades 210 1$aWashington, District of Columbia $cGeorgetown University Press$d2014 215 $a1 online resource (190 p.) 300 $aDescription based upon print version of record. 320 $aIncludes bibliographical references and index. 327 $aContents -- List of tables and figures -- Acknowledgments -- List of abbreviations and acronyms -- Networks of power in the information society -- Theorizing about cyberspace -- Evolution of blockades in different domains -- Cyber attacks on estonia -- The Georgia-Russia war -- Comparing cyber blockades -- Conclusion -- Glossary -- Bibliography -- Index. 330 $aThis is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise render cyberspace useless for an entire country, and Russell also seeks to understand the implications of cyber blockades for international relations. A cyber blockade can be either a legitimate or illegitimate tool depending on the circumstances. What is certain is that the state on the receiving end faces a serious threat to its political, military, economic, and social stability. The book includes two in-depth case studies of cyber blockades, Estonia in 2007 and Georgia in 2008, both of which suffered cyber attacks from Russia. Russell compares cyber blockades with those in other domains (sea, land, air, and space) and offers recommendations for policymakers and for further academic study. 606 $aCyberterrorism$2FBC 606 $aCyberterrorism$xPrevention$2FBC 606 $aCyberspace$xSecurity measures$2FBC 606 $aComputer security 606 $aCyberkrig$2FBC 606 $aComputer sikkerhed$2FBC 615 7$aCyberterrorism. 615 7$aCyberterrorism$xPrevention. 615 7$aCyberspace$xSecurity measures. 615 7$aComputer security. 615 7$aCyberkrig 615 7$aComputer sikkerhed 676 $a327.1/17 686 $a355.424$2z 700 $aRussell$b Alison Lawlor$01520124 701 $aRussell$b Alison Lawlor$01520124 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787038503321 996 $aCyber blockades$93758624 997 $aUNINA