Читать книгу Conflicts, Crimes and Regulations in Cyberspace - Группа авторов - Страница 2
ОглавлениеTable of Contents
1 Cover
5 1 The United States, States and the False Claims of the End of the Global Internet 1.1. Introduction 1.2. The creation of the internet and the development of cyberspace by the United States 1.3. Cyberspace transformed by the arrival in force of states 1.4. Praxis of state coercion in cyberspace 1.5. The fragmentation of the global internet and the digital sovereignty of states 1.6. The strong constraint of interstate cooperation for all states 1.7. Conclusion 1.8. References
6 2 Cybersecurity in America: The US National Security Apparatus and Cyber Conflict Management 2.1. Introduction 2.2. Societal and institutional dynamics 2.3. Organizational and bureaucratic dynamics 2.4. Individual dynamics 2.5. Conclusion 2.6. References
7 3 Separation of Offensive and Defensive Functions: The Originality of the French Cyberdefense Model Called into Question? 3.1. Introduction 3.2. A model designed and developed in response to the threats and challenges of the early 2010s 3.3. A strict separation of offensive and defensive functions and missions: an obstacle to better defense? 3.4. Conclusion 3.5. References
8 4 The Boundary Between Cybercrime and Cyberwar: An Uncertain No-Man’s Land 4.1. Introduction 4.2. The field of cybercrime up to the limits of the glass ceiling 4.3. War in cyberspace, cyber in war 4.4. Conclusion 4.5. References
9 5 Cyberdefense, the Digital Dimension of National Security 5.1. Introduction 5.2. Cyberdefense in the political and legal framework of digital security 5.3. The emergence of a coherent legal regime for cyberdefense 5.4. Conclusion 5.5. References
10 6 Omnipresence Without Omnipotence: The US Campaign Against Huawei in the 5G Era 6.1. Introduction 6.2. The unilateral American offensive against Huawei: a disruptive campaign causing significant collateral damage 6.3. The American diplomatic offensive: the limits of American rhetorical coercion of their partners and allies 6.4. The anti-Huawei offensive: a barometer of American power? 6.5. References
11 7 The Issue of Personal and Sovereign Data in the Light of an Emerging “International Law of Intelligence” 7.1. Introduction 7.2. The legal rules invoked in the collection of personal and sovereign data 7.3. Data localization in the light of international intelligence law 7.4. Conclusion 7.5. Appendix: the quadrants of intelligence law 7.6. Sources and references
12 8 International Cybersecurity Cooperation 8.1. Current attack trends 8.2. The multiple paths of international cooperation 8.3. The issue of attack attribution
13 9 Cyberdefense and Cybersecurity Regulations in the United States: From the Failure of the “Comprehensive Policy” to the Success of the Sectoral Approach 9.1. Introduction 9.2. The identification of a new threat and the impact of cyber on how US security and defense policies are designed 9.3. From the impact of cyber on policy to the impact of politics on cyber 9.4. From a comprehensive cyber policy to a sectoral approach: the success of an undeclared regulatory policy 9.5. Conclusion 9.6. References
15 Index
List of Illustrations
1 Chapter 1Figure 1.1. Number of engineers of different nationalities between 1986 and 2020...Figure 1.2. Number of authors publishing with different engineering companies be...Figure 1.3. Principal components of cyberspaceFigure 1.4. The annual distribution of digital texts (1974–2019)Figure 1.5. The various forms of state coercion in cyberspace. For a color versi...Figure 1.6. Internet penetration rates (2020)...
2 Chapter 3Figure 3.1. The six missions of French cyberdefense...Figure 3.2. Cyberdefense organization in France in 2018...
List of Tables
1 Chapter 1Table 1.1. Themes of digital texts (1974–2019)...Table 1.2. United Nations General Assembly resolutions on cybersecurityTable 1.3. List of GGE reportsTable 1.4. Geographic origin of internet users (2020)...
2 Chapter 2Table 2.1. The various drivers of dysfunction within the US national cybersecuri...
Pages
1 v
2 iii
3 iv
4 xi
5 xii
6 xiii
7 xiv
8 1
9 2
10 3
11 4
12 5
13 6
14 7
15 8
16 9
17 10
18 11
19 12
20 13
21 14
22 15
23 16
24 17
25 18
26 19
27 20
28 21
29 22
30 23
31 24
32 25
33 26
34 27
35 28
36 29
37 30
38 31
39 32
40 33
41 34
42 35
43 36
44 37
45 38
46 39
47 40
48 41
49 42
50 43
51 44
52 45
53 46
54 47
55 48
56 49
57 50
58 51
59 52
60 53
61 54
62 55
63 56
64 57
65 58
66 59
67 60
68 61
69 62
70 63
71 64
72 65
73 66
74 67
75 68
76 69
77 70
78 71
79 72
80 73
81 74
82 75
83 76
84 77
85 78
86 79
87 80
88 81
89 82
90 83
91 84
92 85
93 86
94 87
95 88
96 89
97 90
98 91
99 92
100 93
101 94
102 95
103 96
104 97
105 98
106 99
107 100
108 101
109 102
110 103
111 104
112 105
113 107
114 108
115 109
116 110
117 111
118 112
119 113
120 114
121 115
122 116
123 117
124 118
125 119
126 120
127 121
128 122
129 123
130 124
131 125
132 126
133 127
134 128
135 129
136 130
137 131
138 132
139 133
140 134
141 135
142 136
143 137
144 138
145 139
146 140
147 141
148 142
149 143
150 144
151 145
152 146
153 147
154 148
155 149
156 150
157 151
158 152
159 153
160 154
161 155
162 156
163 157
164 158
165 159
166 160
167 161
168 162
169 163
170 164
171 165
172 166
173 167
174 168
175 169
176 170
177 171
178 172
179 173
180 174
181 175
182 176
183 177
184 178
185 179
186 180
187 181
188 182
189 183
190 184
191 185
192 186
193 187
194 188
195 189
196 190
197 191
198 192
199 193
200 194
201 195
202 196
203 197
204 199
205 201
206 202
207 203
208 205
209 206
210 207
211 208
212 209
213 210
214 211
215 212
216 213
217 214
218 215
219 216