TY - BOOK AU - Rosenzweig,Paul TI - Cyber warfare: how conflicts in cyberspace are challenging America and changing the world T2 - Changing face of war, SN - 9780313398957 AV - U163 .R68 2013 U1 - 355.4 23 PY - 0000/// CY - Santa Barbara, Calif. PB - Praeger KW - Information warfare KW - Cyberterrorism KW - Prevention KW - Cyberspace KW - Security measures KW - Computer security KW - Government policy KW - United States KW - Computer crimes KW - gnd KW - Sicherheitspolitik KW - fast N1 - Includes bibliographical references (pages 271-277) and index; The transformation of cyberspace and cyber conflict -- The nature of cyberspace -- Of viruses and vulnerabilities -- Nations in conflict -- Cyber war and the law -- Cyber-insurgency -- Protecting the web -- The fundamental problem of identity -- Cybercrime -- Cyber conflict and the constitution -- Dataveillance and cyber conflict -- Privacy for the cyber age -- No more secrets -- Encryption and wiretapping -- The devil in the system: hardware failures -- Enduring questions -- The economics of cybersecurity -- The role of government regulating the private sector -- Protecting America's critical infrastructure -- The organization of the US Government -- Challenging questions of policy and organization -- The "borderless" international Internet -- The future and beyond -- What the future holds -- Concluding thoughts N2 - This is a comprehensive and highly topical one-stop source for cyber conflict issues that provides scholarly treatment of the subject in a readable format. The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem. This book describes the nature of cyber threats, including the threat of cyber warfare. It also describes the policies and practices currently in place and proposes optimal responses to the challenges we face. The work should be considered essential reading for national and homeland security professionals as well as students and lay readers wanting to understand of the scope of our shared cybersecurity problem ER -