|
![]() |
|||
|
||||
OverviewThis book explores the extraordinary difficulties a nation-state’s law enforcement and military face in attempting to prevent cyber-attacks. In the wake of recent assaults including the denial of service attack on Estonia in 2007 and the widespread use of the Zeus Trojan Horse software, Susan W. Brenner explores how traditional categories and procedures inherent in law enforcement and military agencies can obstruct efforts to respond to cyberthreats. Brenner argues that the use of a territorially-based system of sovereignty to combat cyberthreats is ineffective, as cyberspace erodes the import of territory. This problem is compounded by the nature of cybercrime as a continually evolving phenomenon driven by rapid and complex technological change. Following an evaluation of the efficacy of the nation-state, the book goes on to explore how individuals and corporations could be integrated into a more decentralized, distributed system of cyberthreat control. Looking at initiatives in Estonia and Sweden which have attempted to incorporate civilians into their cyber-response efforts, Brenner suggests that civilian involvement may mediate the rigid hierarchies that exist among formal agencies and increase the flexibility of any response. This book will be of great interest to students and researchers of information technological law and security studies. Full Product DetailsAuthor: Susan W. Brenner (University of Dayton, USA)Publisher: Taylor & Francis Ltd Imprint: Routledge Dimensions: Width: 15.60cm , Height: 2.00cm , Length: 23.40cm Weight: 0.500kg ISBN: 9780415823760ISBN 10: 0415823765 Pages: 178 Publication Date: 04 March 2014 Audience: College/higher education , Tertiary & Higher Education , Undergraduate Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents1. Cyberchaos: Law and Disorder in Cyberspace 2. Threat Morphing in Cyberspace 3. Threats and the Evolution of Threat Control Strategies 4. Cyberspace and Eroding Threat-Control 5. Proposed –and Possible–Solutions 6. Lessons from History 7. Distributed Security 8. Medieval Cyberspace?ReviewsAuthor InformationSusan W. Brenner is NCR Distinguished Professor of Law and Technology at the University of Dayton, USA. Professor Brenner chaired a Working Group in an American Bar Association project that developed the ITU Toolkit for Cybercrime Legislation for the United Nation's International Telecommunications Union. She is a senior principal for Global CyberRisk, LLC. Tab Content 6Author Website:Countries AvailableAll regions |