did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780198800682

The Oxford Handbook of Cyber Security

by
  • ISBN13:

    9780198800682

  • ISBN10:

    0198800681

  • Format: Hardcover
  • Copyright: 2022-02-04
  • Publisher: Oxford University Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $186.66 Save up to $74.66
  • Rent Book $112.00
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Cyber security is concerned with the identification, avoidance, management and mitigation of risk in, or from, cyber space. The risk concerns harm and damage that might occur as the result of everything from individual carelessness, to organised criminality, to industrial and national security espionage and, at the extreme end of the scale, to disabling attacks against a country's critical national infrastructure. However, there is much more to cyber space than vulnerability, risk, and threat. Cyber space security is an issue of strategy, both commercial and technological, and whose breadth spans the international, regional, national, and personal. It is a matter of hazard and vulnerability, as much as an opportunity for social, economic and cultural growth. Consistent with this outlook, The Oxford Handbook of Cyber Security takes a comprehensive and rounded approach to the still evolving topic of cyber security. The structure of the Handbook is intended to demonstrate how the scope of cyber security is beyond threat, vulnerability, and conflict and how it manifests on many levels of human interaction. An understanding of cyber security requires us to think not just in terms of policy and strategy, but also in terms of technology, economy, sociology, criminology, trade, and morality. Accordingly, contributors to the Handbook include experts in cyber security from around the world, offering a wide range of perspectives: former government officials, private sector executives, technologists, political scientists, strategists, lawyers, criminologists, ethicists, security consultants, and policy analysts.

Author Biography


Paul Cornish, LSE IDEAS, London School of Economics

Paul Cornish was educated at St Andrews, LSE, and Cambridge Universities. He has served in the British Army and the Foreign and Commonwealth Office, and has worked at research institutes including Chatham House, the UK Defence Academy, the Centre for Defence Studies (King's College London), RAND
Europe, and the Universities of Cambridge, Bath, and Exeter. His work covers international security, national strategy, arms control, the ethics of armed force, civil-military relations and cyber security. He was Co-Director of the Cyber Security Capacity Building Centre at Oxford University,
2013-18, and Professorial Fellow at the Australian National University, 2017. He is Visiting Professor at LSE IDEAS, London School of Economics.

Table of Contents


Foreword, Sir David Omand GCB
Introduction, Paul Cornish
PART I. Cyber Space: What it is and Why it Matters
1. The Origins of Cyberspace, David Pym
2. Opportunity, Threat and Dependency in the Social Infosphere, Greg Austin
3. A Political History of Cyberspace, Madeline Carr
4. Cyber Power in International Relations, Camino Kavanagh and Tim Stevens
5. The Ethics of Cyber Security, Onora O Neill
PART II. Security in Cyber Space: Cyber Crime
6. Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace, Roderic Broadhurst
7. Making Sense of Cybersecurity in Emerging Technology Areas, Claire Vishik, Marcello Balduccini, Michael Huth, and Lawrence John
8. Assessing Harm from Cyber Crime, Eva Ignatuschtschenko
9. Toward a Vulnerability Mitigation Model., José Eduardo Malta de Sá Brandão
PART III. Security in Cyber Space: Extremism and Terrorism
10. Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space, Alexander Corbeil and Rafal Rohozinski
11. Cyberweapons, Sandro Gaycken
12. Intentions and Cyberterrorism, Florian Egloff
13. Technology: Access and Denial, Caitríona Heinl
PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
14. Cyber Espionage, Jon Lindsay
15. Cyberwar Redux, Ben Buchanan
16. On Cyber-Enabled Information Warfare and Information Operations, Herbert Lin and Jaclyn Kerr
17. The Deterrence and Prevention of Cyber Conflict, Paul Cornish
PART V. Technical and Corporate Cyber Security
18. Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem, Nicole van der Meulen
19. Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future, Stuart Murdoch
20. Data Privacy and Security Law, Fred Cate and Rachel Dockery
21. The Insider Threat and the Insider Advocate, Mike Steinmetz
PART VI. Personal Cyber Security
22. Personal Protection: Cyber Hygiene, Dave Clemente
23. Online Child Safety, John Carr
24. Educating for Cyber Security, Roger Bradbury
25. Cyber Security, Human Rights and Empiricism: The Case of Digital Surveillance, Jonathon Penney
PART VII. National Cyber Security
26. Securing the Critical National Infrastructure, David Mussington
27. The Role of Defence in National Cyber Security, Mika Kerttunen
28. Cyber Security Capacity Building, Lara Pace and Paul Cornish
PART VIII. Global Trade and Cyber Security
29. Cyber Security, Multilateral Export Control, and Standard Setting Arrangements, Elaine Korzak
30. Cyber Security, Global Commerce, and International Organisations, David Fidler
31. Global Trade and Cyber Security: Monitoring, Enforcement, and Sanctions, Franz-Stefan Gady and Greg Austin
PART IX. International Cyber Security
32. Semi-Formal Diplomacy: Track 1.5 and Track 2, Nigel Inkster
33. States, Proxies, and (Remote) Offensive Cyber Operations, Tim Maurer
34. Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice, Tim Maurer
35. International Law for Cyber Space: Competition and Conflict, Thomas Wingfield and Harry Wingo
PART X. Perspectives on Cyber Security
36. Community of Common Future in Cyberspace: The Proposal and Practice of China, Tang Lan
37. Look West or Look Easta India at the Crossroads of Cyberspace, Arun Mohan Sukumar
38. Cybersecurity in Israel: Organisation and Future Challenges, Lior Tabansky
39. Japan, Yoko Nitta
40. Malaysia, Elina Noor
41. The Russian Federation s Approach to Cyber Security, Anton Shingarev and Anastasya Kazakova
PART XI. Future Challenges
42. Rethinking the Governance of Technology in the Digital Age, Joëlle Webb
43. Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes, Caitríona Heinl
44. The Future Human and Behavioural Challenges of Cyber Security, Debi Ashenden
45. The Future of Democratic Civil Societies in a Post-Western Cybered Era, Chris Demchak
46. Future Normative Challenges, Eneken Tikk
47. Cybersecurity' and 'Development': Contested Futures, Tim Unwin
48. Project Solarium 1953 and the Cyberspace Solarium Commission 2019, Mike Steinmetz
Conclusion, Paul Cornish

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program