Power and Security in the Information Age: Investigating the Role of the State in Cyberspace

Power and Security in the Information Age: Investigating the Role of the State in Cyberspace

Language: English

Pages: 182

ISBN: 0754670880

Format: PDF / Kindle (mobi) / ePub


The marriage of computers and telecommunications, the global integration of these technologies and their availability at low cost is bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may be on the growing importance of information technology today, agreement is far more elusive when it comes to pinning down the impact of this development on security issues. Written by scholars in international relations, this volume focuses on the role of the state in defending against cyber threats and in securing the information age. The manuscript is captivating with the significance and actuality of the issues discussed and the logical, knowledgeable and engaged presentation of the issues. The essays intrigue and provoke with a number of 'fresh' hypotheses, observations and suggestions, and they contribute to mapping the diverse layers, actors, approaches and policies of the cyber security realm.

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Computer Forensics: Evidence Collection & Preservation (Ec-Council Press Series: Computer Forensics)

Crime Signals: How to Spot a Criminal Before You Become a Victim

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits

Android Malware

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Provider of security and economic well-being to the public, thus jeopardizing two of the state’s main duties. For example, states face difficulties in providing substantial security against the threats of information warfare and ‘cyber-terrorism’, and since economic activity is increasingly being conducted beyond the confines of individual states, their ability to secure and control it is being further reduced. Because of ICT, international actors not restricted by geography, such as multinational.

Of Key Issues (Washington, D.C.: National Academies Press, 2003). Porteous, Holly. ‘Some Thoughts on Critical Information Infrastructure Protection’, Canadian IO Bulletin, 2/4, October 1999, , accessed 16 February 2007. Rothkopf, David J., ‘Cyberpolitik: The Changing Nature of Power in the Information Age.’ Journal of International Affairs, 51/2 (1998): 331–56. Satyanarayanan, M., ‘Coping with Uncertainty’, IEEE Pervasive Computing, 02/3 (2003), p. 2.

Decades.48 Today, this approach might just be a trifle too dangerous: Too much depends on the smooth, reliable, and continuous operation of the CII. Furthermore, on the technical level, security 44 Edwin L. Armistead (ed.), Information Operations: The Hard Reality of Soft Power (Washington, 2004). 45 Computer Science and Telecommunications Board, National Research Council, Trust in Cyber-space (Washington, 1999). 46 Stewart D. Personick and Cynthia A. Patterson (eds), Critical Information.

Initiatives have been developed both by NGOs and private individuals. But they suffer from the same limitations as illegal file trading. While technically feasible, territorial authorities will be able to raise the costs (in time and money) of using these tools and the level of technical expertise required so high as to limit their ability to meaningfully scale. From the perspective of national security, these efforts at controlling national internet space to keep out ideas, arguments, and.

Mid2002 and mid-2003, found no federal sites that contained information a terrorist would need to launch an attack. It identified four databases where restricting access probably would enhance national security; none remain available to the public. These included two websites devoted to pipelines, one to nuclear reactors, and one to dams. The researchers recommended that officials evaluate 66 databases with some useful information, but they did not anticipate restrictions would be needed, because.

Download sample

Download