Abstract
The opening chapter introduces the key debates in the sometimes confused realm of cyber security and cyber warfare, It identifies that a normative narrative is developing that the threat of major cyber warfare is a real and present danger. At the same time, a number of scholars cast doubt on the level and likelihood of the threat, not least because of legal ambiguities over what constitutes an act of war. Debate is complicated by the heavy involvement of military security and commercial actors in the discussion. An argument is presented that, while cyber related threats are present in and around modern warfare, the more catastrophic risks of attack may be unlikely at the present time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Notes
K. Geers (2011) Strategic Cyber Security (Tallinn: CCD COE), p. 13.
B. Buzan, O. Waevcr and J. De Wilde (1998) Security: A New Framework for Analysis (London: Lynne Riener), pp. 25–6.
See tor example R. Langner (2011) “Stuxnet: Dissecting a Cyberwarfare Weapon” IEEE Security and Privacy 9/3, 49–51.
A. Hodges (1992) Alan Turing: The Enigma (London: Vintage), p. 403.
J. Arquilla and D. Ronfeldt (1993) “Cyberwar Is Coming!” Comparative Strategy 12/2, 141–65.
T. Rid (2013) Cyber War Will Not Take Place (London: Hurst and Co).
S.B. Griffith (1971) Sun Tzu: The Art of War (Oxford: Oxford University Press).
R.A. Clarke and R.K. Knake (2010) Cyber War: The Next Threat to National Security and What to Do about It (New York: HarperCollins), p. 5.
M.C. Waxman (2011) “Cyber Attacks and the Use of Force”, The Yale Journal of International Law 36, 427–8.
J. Richards (2010) The Art and Science of Intelligence Analysis (Oxford: Oxford University Press), pp. 60–1.
J.A. Lewis (2012) Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. (Washington DC: Center for Strategic and international Studies (CSIS)), p. 8.
Mandiant (2013) APT1: Exposing One of China’s Cyber Espionage Units (Alexandria VA: Mandiant).
Q. Liang and X. Wang (1999) Unrestricted Warfare (Beijing: PLA Literature and Arts Publishing House).
Author information
Authors and Affiliations
Copyright information
© 2014 Julian Richards
About this chapter
Cite this chapter
Richards, J. (2014). Introduction: The Cyber Landscape. In: Cyber-War: The Anatomy of the global Security Threat. Palgrave Pivot, London. https://doi.org/10.1057/9781137399625_1
Download citation
DOI: https://doi.org/10.1057/9781137399625_1
Publisher Name: Palgrave Pivot, London
Print ISBN: 978-1-349-48584-0
Online ISBN: 978-1-137-39962-5
eBook Packages: Palgrave Political Science CollectionPolitical Science and International Studies (R0)