Skip to main content
  • 406 Accesses

Abstract

The opening chapter introduces the key debates in the sometimes confused realm of cyber security and cyber warfare, It identifies that a normative narrative is developing that the threat of major cyber warfare is a real and present danger. At the same time, a number of scholars cast doubt on the level and likelihood of the threat, not least because of legal ambiguities over what constitutes an act of war. Debate is complicated by the heavy involvement of military security and commercial actors in the discussion. An argument is presented that, while cyber related threats are present in and around modern warfare, the more catastrophic risks of attack may be unlikely at the present time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Notes

  1. K. Geers (2011) Strategic Cyber Security (Tallinn: CCD COE), p. 13.

    Google Scholar 

  2. B. Buzan, O. Waevcr and J. De Wilde (1998) Security: A New Framework for Analysis (London: Lynne Riener), pp. 25–6.

    Google Scholar 

  3. See tor example R. Langner (2011) “Stuxnet: Dissecting a Cyberwarfare Weapon” IEEE Security and Privacy 9/3, 49–51.

    Article  Google Scholar 

  4. A. Hodges (1992) Alan Turing: The Enigma (London: Vintage), p. 403.

    Google Scholar 

  5. J. Arquilla and D. Ronfeldt (1993) “Cyberwar Is Coming!” Comparative Strategy 12/2, 141–65.

    Article  Google Scholar 

  6. T. Rid (2013) Cyber War Will Not Take Place (London: Hurst and Co).

    Google Scholar 

  7. S.B. Griffith (1971) Sun Tzu: The Art of War (Oxford: Oxford University Press).

    Google Scholar 

  8. R.A. Clarke and R.K. Knake (2010) Cyber War: The Next Threat to National Security and What to Do about It (New York: HarperCollins), p. 5.

    Google Scholar 

  9. M.C. Waxman (2011) “Cyber Attacks and the Use of Force”, The Yale Journal of International Law 36, 427–8.

    Google Scholar 

  10. J. Richards (2010) The Art and Science of Intelligence Analysis (Oxford: Oxford University Press), pp. 60–1.

    Google Scholar 

  11. J.A. Lewis (2012) Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. (Washington DC: Center for Strategic and international Studies (CSIS)), p. 8.

    Google Scholar 

  12. Mandiant (2013) APT1: Exposing One of China’s Cyber Espionage Units (Alexandria VA: Mandiant).

    Google Scholar 

  13. Q. Liang and X. Wang (1999) Unrestricted Warfare (Beijing: PLA Literature and Arts Publishing House).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2014 Julian Richards

About this chapter

Cite this chapter

Richards, J. (2014). Introduction: The Cyber Landscape. In: Cyber-War: The Anatomy of the global Security Threat. Palgrave Pivot, London. https://doi.org/10.1057/9781137399625_1

Download citation

Publish with us

Policies and ethics