Cornish P. The Oxford Handbook of Cyber Security 2022
Download this torrent!
Cornish P. The Oxford Handbook of Cyber Security 2022
To start this P2P download, you have to install a BitTorrent client like qBittorrent
Category: Other
Total size: 89.34 MB
Added: 4 days ago (2025-06-10 11:39:01)
Share ratio: 52 seeders, 2 leechers
Info Hash: A9F58756293AFEEA8342612D1D27B3AD29C152A7
Last updated: 35 minutes ago (2025-06-14 18:22:06)
Description:
Textbook in PDF format
Cyber security is concerned with the identification, avoidance, management and mitigation of risk in, or from, cyber space. The risk concerns harm and damage that might occur as the result of everything from individual carelessness, to organised criminality, to industrial and national security espionage and, at the extreme end of the scale, to disabling attacks against a country's critical national infrastructure. However, there is much more to cyber space than vulnerability, risk, and threat. Cyber space security is an issue of strategy, both commercial and technological, and whose breadth spans the international, regional, national, and personal. It is a matter of hazard and vulnerability, as much as an opportunity for social, economic and cultural growth. Consistent with this outlook, The Oxford Handbook of Cyber Security takes a comprehensive and rounded approach to the still evolving topic of cyber security. The structure of the Handbook is intended to demonstrate how the scope of cyber security is beyond threat, vulnerability, and conflict and how it manifests on many levels of human interaction. An understanding of cyber security requires us to think not just in terms of policy and strategy, but also in terms of technology, economy, sociology, criminology, trade, and morality. Accordingly, contributors to the Handbook include experts in cyber security from around the world, offering a wide range of perspectives: former government officials, private sector executives, technologists, political scientists, strategists, lawyers, criminologists, ethicists, security consultants, and policy analysts.
Introduction / Paul Cornish
Cyber Space: What It is and Why It Matters
The Origins of Cyberspace / David J. Pym
Opportunity, Threat, and Dependency in the Social Infosphere / Greg Austin
A Political History of Cyberspace / Madeline Carr
Cyber Power in International Relations / Tim Stevens and Camino Kavanagh
Ethical Standards and ‘Communication’ Technologies / Onora O’Neill
Security in Cyber Space: Cyber Crime
Cybercrime: Thieves, Swindlers, Bandits, and Privateers in Cyberspace / Roderic Broadhurst
Making Sense of Cybersecurity in Emerging Technology Areas / Claire Vishik and others
Assessing Harm from Cyber Crime / Eva Ignatuschtschenko
Toward a Vulnerability Mitigation Model / José Eduardo Malta de Sá Brandão
Security in Cyber Space: Extremism and Terrorism
Managing Risk: Terrorism, Violent Extremism, and Anti-Democratic Tendencies in the Digital Space / Alexander Corbeil and Rafal Rohozinski
Cyberweapons / Sandro Gaycken
Intentions and Cyberterrorism / Florian J. Egloff
Technology: Access and Denial / Caitríona Heinl
Security in Cyber Space: State-Sponsored Cyber Attacks
Cyber Espionage / Jon R. Lindsay
Cyberwar Redux / Ben Buchanan
On Cyber-Enabled Information Warfare and Information Operations / Herbert Lin and Jaclyn Kerr
The Deterrence and Prevention of Cyber Conflict / Paul Cornish
Technical and Corporate Cyber Security
Stepping out of the Shadow: Computer Security Incident Response Teams in the Cybersecurity Ecosystem / Nicole van der Meulen
Cybersecurity Information Sharing: Voluntary Beginnings and a Mandatory Future / Stuart Murdoch
Data Privacy and Security Law / Fred Cate and Rachel Dockery
The ‘Insider Threat’ and the ‘Insider Advocate’ / Mike Steinmetz
PART VI Personal Cybersecurity
Personal Protection: ‘Cyber Hygiene’ / Dave Clemente
Online Child Safety / John Carr
Educating for Cyber (Security) / Roger Bradbury
Cybersecurity, Human Rights, and Empiricism: The Case of Digital Surveillance / Jonathon Penney
National Cybersecurity
Securing the Critical National Infrastructure / David Mussington
The Role of Defence in National Cybersecurity / Mika Kerttunen
Cybersecurity Capacity Building / Lara Pace and Paul Cornish
Global Trade and Cybersecurity
Cybersecurity, Multilateral Export Control, and Standard Setting Arrangements / Elaine Korzak
Cybersecurity, Global Commerce, and International Organizations / David Fidler
Global Trade and Cybersecurity: Monitoring, Enforcement, and Sanctions / Franz-Stefan Gady and Greg Austin
PART IX International Cybersecurity
Semi-Formal Diplomacy: Track 1.5 and Track 2 / Nigel Inkster
States, Proxies, and (Remote) Offensive Cyber Operations / Tim Maurer
Getting Beyond Norms: When Violating the Agreement Becomes Customary Practice / Melissa Hathaway
International Law for Cyberspace: Competition and Conflict / Thomas Wingfield and Harry Wingo
Perspectives on Cybersecurity
Community of Common Future in Cyberspace: The Proposal and Practice of China / Tang Lan
Look West or Look East? India at the Crossroads of Cyberspace / Arun Mohan Sukumar
Cybersecurity in Israel: Strategy, Organization, and Future Challenges / Lior Tabansky
The Evolving Concept of the Japanese Security Strategy / Yoko Nitta
Contextualizing Malaysia’s Cybersecurity Agenda / Elina Noor
The Russian Federation’s Approach to Cybersecurity / Anton Shingarev and Anastasiya Kazakova
Future Challenges
Rethinking the Governance of Technology in the Digital Age / Joëlle Webb
Maturing Autonomous Cyber Weapons Systems: Implications for International Cybersecurity / Caitríona Heinl
The Future Human and Behavioural Challenges of Cybersecurity / Debi Ashenden
The Future of Democratic Civil Societies in a Post-Western Cybered Era / Chris Demchak
Future Normative Challenges / Eneken Tikk
‘Cybersecurity’ and ‘Development’: Contested Futures / Tim Unwin
Project Solarium 1953 and the Cyberspace Solarium Commission 2019 / Mike Steinmetz
Conclusion / Paul Cornish
Index