Russian Cyber Operations

Russian Cyber Operations
Автор книги: id книги: 1620997     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 2540,48 руб.     (28,62$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Прочая образовательная литература Правообладатель и/или издательство: Ingram Дата добавления в каталог КнигаЛит: ISBN: 9781626167995 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Russia has deployed cyber operations to interfere in foreign elections, launch disinformation campaigns, and cripple neighboring states—all while maintaining a thin veneer of deniability and avoiding strikes that cross the line into acts of war. How should a targeted nation respond? In Russian Cyber Operations , Scott Jasper dives into the legal and technical maneuvers of Russian cyber strategies, proposing that nations develop solutions for resilience to withstand future attacks.Jasper examines the place of cyber operations within Russia’s asymmetric arsenal and its use of hybrid and information warfare, considering examples from recent French and US presidential elections and the 2017 NotPetya mock ransomware attack, among others. Jasper shows the international effort to counter these operations through sanctions and indictments has done little to alter Moscow’s behavior and instead proposes that nations use data correlation technologies in an integrated security platform to establish a more resilient defense. Russian Cyber Operations provides a critical framework for determining whether Russian cyber campaigns and incidents rise to the level of armed conflict or operate at a lower level as a component of competition. Jasper’s work offers the national security community a robust plan of action critical to effectively mounting a durable defense against Russian cyber campaigns.

Оглавление

Scott Jasper. Russian Cyber Operations

RUSSIAN CYBER OPERATIONS

Contents

Illustrations

Foreword

Acknowledgments

Abbreviations

Introduction. Below the Threshold

Conceptual Foundations

Book Overview

Notes

CHAPTER 1. Analytical Framework

Act of War

Legal Regimes

Technical Means

Framework Application

Ukraine Power Grid

Conclusion

Notes

CHAPTER 2. Asymmetric Arsenal Tool

Asymmetric Approach

Strategy and Doctrine

Cyber Coercion

2007 Estonia Assault

Cyber Warfare

2008 Georgian Invasion

Investment Trends

Conclusion

Notes

CHAPTER 3. Hybrid Warfare Element

Western Conception

Gerasimov Doctrine

2014 Crimean Incursion

Russian Perspectives

Donbass Intervention

Conclusion

Notes

CHAPTER 4. Information Warfare Component

Information Concepts

Influence Operations

2016 US Presidential Election

Political Warfare

Conclusion

Notes

CHAPTER 5. Rational State Behavior

International Norms

Pseudo Ransomware

NotPetya Campaign

Defense of Sovereignty

National Interest Pursuit

Norm-Compliance Options

New Round of Talks

Narrowly Tailored Deals

Latest Developments

Conclusion

Notes

CHAPTER 6. Unconvincing Responses

Deterrence Theories

Subdued Reaction

2017 French Presidential Election

Name and Shame

Economic Sanctions

Legal Indictments

Coercive Diplomacy

Military Action

Conclusion

Notes

CHAPTER 7. Current Security Strategies

Risk Management

Risk Management Framework

Cybersecurity Framework

Defense-in-Depth Strategies

Cyber Kill Chain

Intrusion Kill Chain

Center for Internet Security Controls

Shared Cyber-Threat Intelligence

Kill Chain Analysis

US Energy Sector Attacks

Suggested Strategy Shortfalls

Conclusion

Notes

CHAPTER 8. Automated Cyber Defense

Resilience Theories

Tactics and Techniques

New Investments

Security Operations Automation

Endpoint Detection and Response

Quasi Ransomware

Bad Rabbit Campaign

Security Operating Platform

Conclusion

Notes

CHAPTER 9. Technical Offset Strategy

Continued Confrontation

Unclear Norms

Offset Technologies

Data-Correlation Technologies

Deep-Learning Machines

Human-Machine Teaming

Conclusion

Notes

Conclusion. A Different Approach

Legal Ambiguity

Technical Complexity

More Aggressive Strategy

Concluding Considerations

Notes

Index

About the Author

Отрывок из книги

RUSSIAN CYBER OPERATIONS

Conflict and Cooperation in the Global Commons: A Comprehensive Approach for International Security edited by Scott Jasper

.....

47.Schmitt, Tallinn Manual 2.0, 21.

48.Schmitt, 22.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Russian Cyber Operations
Подняться наверх