Crisis and escalation in cyberspace / / Martin C. Libicki |
Autore | Libicki Martin C |
Pubbl/distr/stampa | Santa Monica, CA : , : RAND, Project Air Force, , 2012 |
Descrizione fisica | 1 online resource (279 p.) |
Disciplina | 358.4/141 |
Soggetto topico |
Information warfare - United States
Escalation (Military science) Cyberspace - Security measures Crisis management - Government policy - United States Cyberterrorism - Prevention Conflict management |
Soggetto genere / forma | Electronic books. |
ISBN |
0-8330-7679-5
0-8330-7680-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Avoiding crises by creating norms -- Narratives, dialogues, and signaling -- Escalation management -- Strategic stability -- Conclusions and recommendations for the Air Force -- Introduction -- Some hypothetical crises -- Mutual mistrust is likely to characterize a cyber crisis -- States may have room for maneuver in a cyber crisis -- A note on methodology -- Purpose and organization -- Avoiding crises by creating norms -- What kind of norms might be useful? -- Enforce laws against hacking -- Disassociate from freelance hackers -- Discourage commercial espionage -- Be careful about the obligation to suppress cyber traffic -- How do we enforce norms? -- Confidence-building measures -- Norms for victims of cyberattacks -- Norms for war? -- Deception -- Military necessity and collateral damage -- Proportionality -- Reversibility -- Conclusions -- Narratives, dialogue, and signals -- Narratives to promote control -- A narrative framework for cyberspace -- Victimization, attribution, retaliation, and aggression -- Victimization -- Attribution -- Retaliation -- Aggression -- Emollients: narratives to walk back a crisis -- We did nothing -- Well, at least not on our orders -- It was an accident -- This is nothing new -- At least it does not portend anything -- Broader considerations -- Signals -- Ambiguity in signaling -- Signaling resolve -- Signaling that cyber combat is not kinetic combat -- Conclusions -- Escalation management -- Motives for escalation -- Does escalation matter? -- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? -- Can cyberwar disarm another states cyberwarriors? -- Does cyberwar lend itself to alert-reaction cycles? -- Are cyberdefenses inherently destabilizing? -- Would a cyberspace arms races be destabilizing? -- Misperception as a source of crisis -- Side takes great exception to cyberespionage -- Defenses are misinterpreted as preparations for war -- Too much confidence in attribution -- Too much confidence in or fear of pre-emption -- Supposedly risk-free cyberattacks -- Neutrality -- Conclusions -- Can cyber crises be managed? -- A. Distributed denial-of-service attacks -- B. Overt, obvious, and covert cyberattacks and responses -- Can good cyberdefenses discourage attacks? -- Bibliography -- Figures -- Figure 1: Alternative postures for a master cyber narrative -- Figure 2: Sources of imprecision in tit for tat -- Figure 3: An inadvertent path to mutual escalation -- Figure A-1: Configuring networks to limit the damage of DDoS attacks -- Table -- Overt, obvious, and covert cyberattacks and responses. |
Record Nr. | UNINA-9910219977703321 |
Libicki Martin C
![]() |
||
Santa Monica, CA : , : RAND, Project Air Force, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cyber practices : what can the U.S. Air Force learn from the commercial sector |
Autore | Schmidt Lara |
Pubbl/distr/stampa | [Place of publication not identified], : Rand Corporation, 2015 |
Disciplina | 358.4/141 |
Collana | [Research report] Cyber practices |
Soggetto topico |
Information technology - Management
Information services industry - Personnel management Management Theory Management Business & Economics |
ISBN | 0-8330-9324-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Cyber Practices |
Record Nr. | UNINA-9910219968003321 |
Schmidt Lara
![]() |
||
[Place of publication not identified], : Rand Corporation, 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Risky business : reducing moral hazard in airlift operations / / Robert C. Bearden |
Autore | Bearden Robert C. <1975-> |
Pubbl/distr/stampa | Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , 2015 |
Descrizione fisica | 1 online resource (xv, 81 pages) |
Disciplina | 358.4/141 |
Collana | Drew paper |
Soggetto topico |
Airlift, Military - United States
Dien Bien Phu, Battle of, Điện Biên Phủ, Vietnam, 1954 Khe Sanh, 2nd Battle of, Vietnam, 1968 Airlift, Military |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Reducing moral hazard in airlift operations |
Record Nr. | UNINA-9910708497703321 |
Bearden Robert C. <1975->
![]() |
||
Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|