Muutke küpsiste eelistusi

Cyber Intelligence: Actors, Policies, Practices [Pehme köide]

  • Formaat: Paperback / softback, 441 pages, kõrgus x laius: 229x152 mm, kaal: 605 g
  • Ilmumisaeg: 01-Nov-2021
  • Kirjastus: Lynne Rienner Publishers Inc
  • ISBN-10: 1626379661
  • ISBN-13: 9781626379664
Teised raamatud teemal:
  • Formaat: Paperback / softback, 441 pages, kõrgus x laius: 229x152 mm, kaal: 605 g
  • Ilmumisaeg: 01-Nov-2021
  • Kirjastus: Lynne Rienner Publishers Inc
  • ISBN-10: 1626379661
  • ISBN-13: 9781626379664
Teised raamatud teemal:
"A comprehensive overview of cyber intelligence, explaining what it is, why it is needed, who is doing it, and how it is done"--

"A valuable contribution…. Providing many detailed examples of cyber attacks aimed at the public and private sectors, Uthoff both documents and explains the various US policies and doctrines related to cyber intelligence and cyber threats from the 1990s to the present." —John D. Woodward, Jr., Boston University

US national security compromised by Wikileaks. Towns held hostage by ransomware. Corporate websites hacked. Cyber espionage and cybercrimes are increasing in both frequency and sophistication—requiring the collection of actionable intelligence in order to combat them. Constance Uthoff provides a comprehensive overview of cyber intelligence, explaining what it is, why it is needed, who is doing it, and how it is done.

Notably, Cyber Intelligence:

• Outlines the roles of the major US intelligence agencies involved.
• Assesses significant laws and policies from the 1990s to the present.
• Compares methods and best practices across the public and private sectors.
• Looks beyond the US to explore the capabilities of actors like China, Iran, and Russia.
• Includes real-world examples and case studies.

The result is an in-depth examination of the processes and applications of spying in cyberspace, accessible to a wide range of readers. 

CONTENTS:
  • The Cyber Domain.
  • The Threat Landscape.
  • The Cyber Intelligence Cycle and Process.
  • National Security Strategies and Policies.
  • The Office of the Director of National Intelligence.
  • The National Security Agency.
  • The Central Intelligence Agency.
  • The Federal Bureau of Investigation.
  • Intelligence Sharing.
  • Counterintelligence Efforts.
  • Cyber Operations in International Conflicts.
  • Cyber Threats and Nonstate Actors.
  • Emerging Cybersecurity Challenges.
  • Three Case Studies of Cyber Espionage.
  • The Future of Cyber Intelligence.

Arvustused

A practical tool in our understanding of the cyber intelligence and conflict discipline. Kudos to the author... for producing a useful and readable cyber-related and national security-focused work. Robert J. Bunker, Parameters

An excellent reference work to have at hand when studying the US intelligence community. C. Dale Walton, Comparative Strategy

1 The Cyber Domain
1(10)
2 The Threat Landscape
11(28)
3 The Cyber Intelligence Cycle and Process
39(30)
4 National Security Strategies and Policies
69(44)
5 The Office of the Director of National Intelligence
113(16)
6 The National Security Agency
129(24)
7 The Central Intelligence Agency
153(28)
8 The Federal Bureau of Investigation
181(20)
9 Intelligence Sharing
201(24)
10 Counterintelligence Efforts
225(16)
11 Cyber Operations in International Conflicts
241(66)
12 Cyber Threats and Nonstate Actors
307(28)
13 Emerging Cybersecurity Challenges
335(14)
14 Three Case Studies of Cyber Espionage
349(16)
15 The Future of Cyber Intelligence
365(18)
List of Acronyms 383(4)
Bibliography 387(34)
Index 421(20)
About the Book 441
Constance S. Uthoff is associate program director of the Cybersecurity Strategy and Information Management Program at George Washington University.