Fr. 126.00

Cyber Security Challenges Confronting Canada and the United States

English · Hardback

Shipping usually within 3 to 5 weeks

Description

Read more

This study turned the tables on a conventional understanding of the four instruments of national power (diplomacy, information, military and economic measures/D.I.M.E.) to see how potential adversaries could use these against the national security interests of Canada and the United States. Moreover, this particular work focuses on qualitative research regarding cyber threats that have continually beleaguered these nations by malevolent actors mostly over the last five years. This study also affords consideration to how nefarious individuals, non-state actors, or nation states can implement the instruments of national power through the application of a new model named the York Intelligence Red Team Model-Cyber (YIRTM-C) using sources guided by the Federal Qualitative Secondary Data Case Study Triangulation Model to arrive at results.

List of contents

List of Illustrations - List of Tables - Preface - Introduction and Background - Research Questions, Methodology, and Limitations - The Canada-U.S. Alliance - Al Qaeda - People's Republic of China (China) - Islamic Republic of Iran (Iran) - Islamic State (IS) - Democratic Republic of North Korea (DPRK/North Korea) - Russian Federation (Russia) - Analysis and Findings - Conclusion - About the Authors - Index.

About the author










John Michael Weaver (DPA, University of Baltimore) is Associate Professor of Intelligence Analysis at York College of Pennsylvania (USA).
Benjamin T. Johnson is a PH.D. candidate in the field of political science at York University in Toronto (Canada).

Summary

This work examines qualitative research regarding cyber threats that have continually beleaguered Canada and the United States by malevolent actors mostly over the last five years.

Report

"Information is the core asset that ties a nation's diplomatic, military, and economic capabilities together. Today's cyber technologies allow greater collection, analysis, and dissemination of that information than at any point previously in human history. The complexity of this new Cyber Domain allows for a tremendous increase in speed and capability, while also introducing new challenges that must be addressed. The barrier to entry for malicious actors, whether nation states or non-state actors, to commit harm against their enemies has been dramatically lowered. It has never been easier to commit harm to the interests of a nation and its people without the need for personal, physical risk than right now. Cyber Security Challenges Confronting Canada and the United States encapsulates the complexities of these challenges as they pertain to Canada and the United States. The authors examine how the Cyber Domain now influences and shapes those nations' diplomatic, military, and economic policies. They define the new cyber domain in which nations must now operate, and illustrate various threats and risks to Canadian and U.S. interests. Also, they propose a new analytical model with which to examine these risks, and determine policy meant to mitigate them. This book is a must-read to help one understand the complexities of the cyber domain, and how it now helps shape and define policy." -Robert Hunter, Cyber Forensic Examiner, Department of Defense Cyber Crime Center (DC3)

Product details

Authors Benjamin Johnson, Benjamin T Johnson, Benjamin T. Johnson, John Michae Weaver, John Michael Weaver
Publisher Peter Lang
 
Languages English
Product format Hardback
Released 01.01.2020
 
EAN 9781433181009
ISBN 978-1-4331-8100-9
No. of pages 148
Dimensions 157 mm x 14 mm x 231 mm
Weight 344 g
Illustrations 12 Abb.
Subjects Social sciences, law, business > Political science > Political science and political education

USA, Johnson, Canada, Benjamin, POLITICAL SCIENCE / General, Challenges, Smith, Contemporary, john, michael, Security, Cyber, Political science & theory, States, United States of America, USA, Michelle, Weaver, United, Political science and theory, Computer security, Confronting

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.