This is a preview of how your content will look on export. To export the complete content in DOC format,
click the blue export button in the upper right corner of this page.
2.2 Seriousness of the Threat
There is no doubt that cybersecurity is a serious problem due to the widespread dependency on computer and computer systems, and their extraordinary vulnerability. But how much of a problem? This is a difficult issue to analyze because (as we learned in 2.1) metrics are hard to come by in the cybersecurity realm, and because many actors have incentives to exaggerate the threat.
1 Richard Clarke and Robert Knake, Cyber War: The next Threat to National Security and What to Do About It, 2010
Cyber War goes behind the “geek talk” of hackers and computer scientists to explain clearly and convincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals.
2 Joel Brenner, America the Vulnerable: Inside the New Matrix of Digital Espionage, Crime, and Warfare, 2011
This book begins by describing how electronic data has become “ambient”— all electronic activities are aggregated as data, behavior patterns are identiﬁed, and the resulting information is used per the needs of whoever has the data. Brenner argues that the most vulnerable part of any network is the user, however particular attention is also given to operational infrastructure systems.
3 Thomas Rid, Cyber War Will Not Take Place. The Journal of Strategic Studies Vol. 35, No. 1, 5–32, February 2012
4 Evgeny Morozov, Cyber-Scare: The Exaggerated Fears Over Digital Warfare, Boston Review, July/August 2009
You've reached the bottom of your content preview.
To view the rest in your browser, click here.
the complete content in DOC format, click the blue export button in the upper right corner of this page.
(Note: If you view the entire playlist, any changes you've made to export settings will be lost. Large playlists may temporarily freeze your browser while loading, as well.)