Back to Search

Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition: Malevolent Actors, Criminal Opportunities, and Strategic Competition

PUBLISHER Department of the Army (10/18/2016)
PRODUCT TYPE Paperback (Paperback)

Description

This report is intended to provide cyberspace decision-makers with a more comprehensive, clearer description of cyberspace, which they can use to manage and make decisions about cyberspace programs to improve the effectiveness of government in this critically important area. The report offers an assessment of and recommendations focused on the unique characteristics of cyberspace, which were initially designed without much focus on security or risk management. It has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. At the same time, it is a space of opportunities for benevolent, neutral, and malevolent actors. The authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand.

This volume is designed to inform and provoke, as well as assist civilian and military national security, commerce, public sector, and academic decision-makers in understanding the sheer complexity and dynamism of cyberspace itself. This resource may also be helpful to students for research in Master's or Undergraduate cybersecurity degree programs orcoursework in courses, pertaining to topics, such asArtificial Intelligence, Intrusion Detection & Vulnerability Management, Computer Security, or Digital Forensics"
Show More
Product Format
Product Details
ISBN-13: 9781584877264
ISBN-10: 158487726X
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 679
Carton Quantity: 0
Feature Codes: Bibliography, Maps, Illustrated
Country of Origin: US
Subject Information
BISAC Categories
Computers | Cybernetics
Computers | Security - Online Safety & Privacy
Computers | Mobile & Wireless Communications
Grade Level: College Freshman - 5th Grade
Dewey Decimal: 364.168
Library of Congress Control Number: 2018400862
Descriptions, Reviews, Etc.
publisher marketing

This report is intended to provide cyberspace decision-makers with a more comprehensive, clearer description of cyberspace, which they can use to manage and make decisions about cyberspace programs to improve the effectiveness of government in this critically important area. The report offers an assessment of and recommendations focused on the unique characteristics of cyberspace, which were initially designed without much focus on security or risk management. It has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats. One of the most significant features of cyberspace is that it is becoming a risky place for the entire spectrum of users: nation-states, nongovernmental and transnational organizations, commercial enterprises, and individuals. At the same time, it is a space of opportunities for benevolent, neutral, and malevolent actors. The authors identify and assess the challenges and threats to security that can arise in cyberspace because of its unique nature. In the final section, the authors discuss a variety of responses, with some suggesting that the most favored options being pursued by the United States are poorly conceived and ill-suited to the tasks at hand.

This volume is designed to inform and provoke, as well as assist civilian and military national security, commerce, public sector, and academic decision-makers in understanding the sheer complexity and dynamism of cyberspace itself. This resource may also be helpful to students for research in Master's or Undergraduate cybersecurity degree programs orcoursework in courses, pertaining to topics, such asArtificial Intelligence, Intrusion Detection & Vulnerability Management, Computer Security, or Digital Forensics"
Show More
List Price $66.00
Your Price  $65.34
Paperback