Product details:
ISBN13: | 9780198800682 |
ISBN10: | 0198800681 |
Binding: | Hardback |
No. of pages: | 890 pages |
Size: | 252x176x59 mm |
Weight: | 1672 g |
Language: | English |
1241 |
Category:
The Oxford Handbook of Cyber Security
Series:
Oxford Handbooks;
Publisher: OUP Oxford
Date of Publication: 4 November 2021
Normal price:
Publisher's listprice:
GBP 157.50
GBP 157.50
Your price:
72 483 (69 032 HUF + 5% VAT )
discount is: 10% (approx 8 054 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
Click here to subscribe.
Availability:
printed on demand
Can't you provide more accurate information?
Short description:
The Oxford Handbook of Cyber Security presents forty-eight chapters examining the technological, economic, commercial, and strategic aspects of cyber security, including studies at the international, regional, amd national level.
Long description:
Cyber security is concerned with the identification, avoidance, management and mitigation of risk in, or from, cyber space. The risk concerns harm and damage that might occur as the result of everything from individual carelessness, to organised criminality, to industrial and national security espionage and, at the extreme end of the scale, to disabling attacks against a country's critical national infrastructure. However, there is much more to cyber space than vulnerability, risk, and threat. Cyber space security is an issue of strategy, both commercial and technological, and whose breadth spans the international, regional, national, and personal. It is a matter of hazard and vulnerability, as much as an opportunity for social, economic and cultural growth. Consistent with this outlook, The Oxford Handbook of Cyber Security takes a comprehensive and rounded approach to the still evolving topic of cyber security. The structure of the Handbook is intended to demonstrate how the scope of cyber security is beyond threat, vulnerability, and conflict and how it manifests on many levels of human interaction. An understanding of cyber security requires us to think not just in terms of policy and strategy, but also in terms of technology, economy, sociology, criminology, trade, and morality. Accordingly, contributors to the Handbook include experts in cyber security from around the world, offering a wide range of perspectives: former government officials, private sector executives, technologists, political scientists, strategists, lawyers, criminologists, ethicists, security consultants, and policy analysts.
Table of Contents:
Foreword
Introduction
PART I. Cyber Space: What it is and Why it Matters
The Origins of Cyberspace
Opportunity, Threat and Dependency in the Social Infosphere
A Political History of Cyberspace
Cyber Power in International Relations
Ethical Standards and 'Communication' Technologies
PART II. Security in Cyber Space: Cyber Crime
Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace
Making Sense of Cybersecurity in Emerging Technology Areas
Assessing Harm from Cyber Crime
Toward a Vulnerability Mitigation Model.
PART III. Security in Cyber Space: Extremism and Terrorism
Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space
Cyberweapons
Intentions and Cyberterrorism
Technology: Access and Denial
PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
Cyber Espionage
Cyberwar Redux
On Cyber-Enabled Information Warfare and Information Operations
The Deterrence and Prevention of Cyber Conflict
PART V. Technical and Corporate Cyber Security
Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem
Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future
Data Privacy and Security Law
The Insider Threat and the Insider Advocate
PART VI. Personal Cyber Security
Personal Protection: Cyber Hygiene
Online Child Safety
Educating for Cyber Security
Cyber Security, Human Rights and Empiricism: The Case of Digital Surveillance
PART VII. National Cyber Security
Securing the Critical National Infrastructure
The Role of Defence in National Cyber Security
Cyber Security Capacity Building
PART VIII. Global Trade and Cyber Security
Cyber Security, Multilateral Export Control, and Standard Setting Arrangements
Cyber Security, Global Commerce, and International Organisations
Global Trade and Cyber Security: Monitoring, Enforcement, and Sanctions
PART IX. International Cyber Security
Semi-Formal Diplomacy: Track 1.5 and Track 2
States, Proxies, and (Remote) Offensive Cyber Operations
Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice
International Law for Cyber Space: Competition and Conflict
PART X. Perspectives on Cyber Security
Community of Common Future in Cyberspace: The Proposal and Practice of China
Look West or Look Easta India at the Crossroads of Cyberspace
Cybersecurity in Israel: Organisation and Future Challenges
The Evolving Concept of the Japanese Security Strategy
Contextualizing Malaysia's Cybersecurity Agenda
The Russian Federation s Approach to Cyber Security
PART XI. Future Challenges
Rethinking the Governance of Technology in the Digital Age
Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes
The Future Human and Behavioural Challenges of Cyber Security
The Future of Democratic Civil Societies in a Post-Western Cybered Era
Future Normative Challenges
Cybersecurity' and 'Development': Contested Futures
Project Solarium 1953 and the Cyberspace Solarium Commission 2019
Conclusion
Introduction
PART I. Cyber Space: What it is and Why it Matters
The Origins of Cyberspace
Opportunity, Threat and Dependency in the Social Infosphere
A Political History of Cyberspace
Cyber Power in International Relations
Ethical Standards and 'Communication' Technologies
PART II. Security in Cyber Space: Cyber Crime
Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace
Making Sense of Cybersecurity in Emerging Technology Areas
Assessing Harm from Cyber Crime
Toward a Vulnerability Mitigation Model.
PART III. Security in Cyber Space: Extremism and Terrorism
Managing Risk: Terrorism, Violent Extremism and Anti-Democratic Tendencies in the Digital Space
Cyberweapons
Intentions and Cyberterrorism
Technology: Access and Denial
PART IV. Security in Cyber Space: State-Sponsored Cyber Attacks
Cyber Espionage
Cyberwar Redux
On Cyber-Enabled Information Warfare and Information Operations
The Deterrence and Prevention of Cyber Conflict
PART V. Technical and Corporate Cyber Security
Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem
Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future
Data Privacy and Security Law
The Insider Threat and the Insider Advocate
PART VI. Personal Cyber Security
Personal Protection: Cyber Hygiene
Online Child Safety
Educating for Cyber Security
Cyber Security, Human Rights and Empiricism: The Case of Digital Surveillance
PART VII. National Cyber Security
Securing the Critical National Infrastructure
The Role of Defence in National Cyber Security
Cyber Security Capacity Building
PART VIII. Global Trade and Cyber Security
Cyber Security, Multilateral Export Control, and Standard Setting Arrangements
Cyber Security, Global Commerce, and International Organisations
Global Trade and Cyber Security: Monitoring, Enforcement, and Sanctions
PART IX. International Cyber Security
Semi-Formal Diplomacy: Track 1.5 and Track 2
States, Proxies, and (Remote) Offensive Cyber Operations
Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice
International Law for Cyber Space: Competition and Conflict
PART X. Perspectives on Cyber Security
Community of Common Future in Cyberspace: The Proposal and Practice of China
Look West or Look Easta India at the Crossroads of Cyberspace
Cybersecurity in Israel: Organisation and Future Challenges
The Evolving Concept of the Japanese Security Strategy
Contextualizing Malaysia's Cybersecurity Agenda
The Russian Federation s Approach to Cyber Security
PART XI. Future Challenges
Rethinking the Governance of Technology in the Digital Age
Maturing Autonomous Cyber Weapons Systems: Implications for International Cyber Security and Autonomous Weapons Systems Regimes
The Future Human and Behavioural Challenges of Cyber Security
The Future of Democratic Civil Societies in a Post-Western Cybered Era
Future Normative Challenges
Cybersecurity' and 'Development': Contested Futures
Project Solarium 1953 and the Cyberspace Solarium Commission 2019
Conclusion