Читать книгу Conflicts, Crimes and Regulations in Cyberspace - Группа авторов - Страница 2

Оглавление

Table of Contents

Cover

Title Page

Copyright

Introduction References

1 The United States, States and the False Claims of the End of the Global Internet 1.1. Introduction 1.2. The creation of the internet and the development of cyberspace by the United States 1.3. Cyberspace transformed by the arrival in force of states 1.4. Praxis of state coercion in cyberspace 1.5. The fragmentation of the global internet and the digital sovereignty of states 1.6. The strong constraint of interstate cooperation for all states 1.7. Conclusion 1.8. References

2 Cybersecurity in America: The US National Security Apparatus and Cyber Conflict Management 2.1. Introduction 2.2. Societal and institutional dynamics 2.3. Organizational and bureaucratic dynamics 2.4. Individual dynamics 2.5. Conclusion 2.6. References

3 Separation of Offensive and Defensive Functions: The Originality of the French Cyberdefense Model Called into Question? 3.1. Introduction 3.2. A model designed and developed in response to the threats and challenges of the early 2010s 3.3. A strict separation of offensive and defensive functions and missions: an obstacle to better defense? 3.4. Conclusion 3.5. References

4 The Boundary Between Cybercrime and Cyberwar: An Uncertain No-Man’s Land 4.1. Introduction 4.2. The field of cybercrime up to the limits of the glass ceiling 4.3. War in cyberspace, cyber in war 4.4. Conclusion 4.5. References

5 Cyberdefense, the Digital Dimension of National Security 5.1. Introduction 5.2. Cyberdefense in the political and legal framework of digital security 5.3. The emergence of a coherent legal regime for cyberdefense 5.4. Conclusion 5.5. References

10  6 Omnipresence Without Omnipotence: The US Campaign Against Huawei in the 5G Era 6.1. Introduction 6.2. The unilateral American offensive against Huawei: a disruptive campaign causing significant collateral damage 6.3. The American diplomatic offensive: the limits of American rhetorical coercion of their partners and allies 6.4. The anti-Huawei offensive: a barometer of American power? 6.5. References

11  7 The Issue of Personal and Sovereign Data in the Light of an Emerging “International Law of Intelligence” 7.1. Introduction 7.2. The legal rules invoked in the collection of personal and sovereign data 7.3. Data localization in the light of international intelligence law 7.4. Conclusion 7.5. Appendix: the quadrants of intelligence law 7.6. Sources and references

12  8 International Cybersecurity Cooperation 8.1. Current attack trends 8.2. The multiple paths of international cooperation 8.3. The issue of attack attribution

13  9 Cyberdefense and Cybersecurity Regulations in the United States: From the Failure of the “Comprehensive Policy” to the Success of the Sectoral Approach 9.1. Introduction 9.2. The identification of a new threat and the impact of cyber on how US security and defense policies are designed 9.3. From the impact of cyber on policy to the impact of politics on cyber 9.4. From a comprehensive cyber policy to a sectoral approach: the success of an undeclared regulatory policy 9.5. Conclusion 9.6. References

14  List of Authors

15  Index

16  End User License Agreement

List of Illustrations

1 Chapter 1Figure 1.1. Number of engineers of different nationalities between 1986 and 2020...Figure 1.2. Number of authors publishing with different engineering companies be...Figure 1.3. Principal components of cyberspaceFigure 1.4. The annual distribution of digital texts (1974–2019)Figure 1.5. The various forms of state coercion in cyberspace. For a color versi...Figure 1.6. Internet penetration rates (2020)...

2 Chapter 3Figure 3.1. The six missions of French cyberdefense...Figure 3.2. Cyberdefense organization in France in 2018...

3 Chapter 7Figure 7.1. The quadrants of intelligence law

List of Tables

1 Chapter 1Table 1.1. Themes of digital texts (1974–2019)...Table 1.2. United Nations General Assembly resolutions on cybersecurityTable 1.3. List of GGE reportsTable 1.4. Geographic origin of internet users (2020)...

2 Chapter 2Table 2.1. The various drivers of dysfunction within the US national cybersecuri...

Guide

Cover

2 Table of Contents

Title Page

Copyright

Introduction

Begin Reading

List of Authors

Index

End User License Agreement

Pages

v

iii

iv

xi

xii

xiii

xiv

1

2

10  3

11  4

12  5

13  6

14  7

15  8

16  9

17  10

18  11

19  12

20  13

21  14

22  15

23  16

24  17

25  18

26  19

27  20

28  21

29  22

30  23

31  24

32  25

33 26

34  27

35  28

36  29

37  30

38  31

39  32

40  33

41  34

42  35

43  36

44  37

45  38

46  39

47  40

48  41

49  42

50  43

51  44

52  45

53  46

54  47

55  48

56  49

57  50

58  51

59  52

60  53

61  54

62  55

63  56

64  57

65  58

66  59

67  60

68  61

69  62

70  63

71  64

72  65

73  66

74  67

75  68

76  69

77  70

78  71

79  72

80  73

81  74

82  75

83  76

84  77

85  78

86  79

87  80

88  81

89  82

90  83

91  84

92  85

93  86

94  87

95  88

96  89

97  90

98  91

99  92

100  93

101 94

102  95

103  96

104  97

105  98

106  99

107  100

108  101

109  102

110  103

111 104

112  105

113  107

114  108

115 109

116  110

117  111

118  112

119  113

120  114

121  115

122  116

123  117

124  118

125  119

126  120

127  121

128  122

129  123

130  124

131  125

132  126

133  127

134  128

135  129

136  130

137  131

138  132

139  133

140  134

141  135

142  136

143  137

144  138

145  139

146  140

147  141

148  142

149  143

150  144

151  145

152  146

153  147

154  148

155  149

156  150

157  151

158  152

159  153

160  154

161  155

162  156

163  157

164  158

165  159

166  160

167  161

168  162

169  163

170  164

171  165

172  166

173  167

174  168

175  169

176  170

177 171

178 172

179  173

180  174

181  175

182 176

183  177

184  178

185  179

186  180

187  181

188  182

189  183

190  184

191  185

192  186

193  187

194  188

195  189

196  190

197  191

198  192

199  193

200  194

201  195

202  196

203  197

204  199

205  201

206 202

207  203

208  205

209  206

210  207

211  208

212  209

213  210

214  211

215  212

216  213

217  214

218  215

219  216

Conflicts, Crimes and Regulations in Cyberspace

Подняться наверх