|
|
|||
|
||||
OverviewUS national security compromised by Wikileaks. Towns held hostage by ransomware. Corporate websites hacked. Cyber espionage and cybercrimes are increasing in both frequency and sophistication - requiring the collection of actionable intelligence in order to combat them. Constance Uthoff provides a comprehensive overview of cyber intelligence, explaining what it is, why it is needed, who is doing it, and how it is done. Notably, Cyber Intelligence: Outlines the roles of the major US intelligence agencies involved. Assesses significant laws and policies from the 1990s to the present. Compares methods and best practices across the public and private sectors. Looks beyond the US to explore the capabilities of actors like China, Iran, and Russia. Includes real-world examples and case studies. The result is an in-depth examination of the processes and applications of spying in cyberspace, accessible to a wide range of readers. Full Product DetailsAuthor: Constance S. UthoffPublisher: Lynne Rienner Publishers Inc Imprint: Lynne Rienner Publishers Inc Weight: 0.708kg ISBN: 9781626379657ISBN 10: 1626379653 Pages: 441 Publication Date: 30 October 2021 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Temporarily unavailable The supplier advises that this item is temporarily unavailable. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out to you. Table of ContentsThe Cyber Realm The Cyber Intelligence Cycles and Process National Security Strategies and Policies The Office of the Director of National Intelligence The National Security Agency The Central Intelligence Agency The Federal Bureau of Investigation Intelligence Sharing Counterintelligence Efforts Cyber Operations in International Conflicts Cyber Threats and Nonstate Actors Emerging Cyber Challenges in the Public and Private Sectors Three Case Studies of Cyber Espionage The Future of Cyber Intelligence.Reviews“A practical tool in our understanding of the cyber intelligence and conflict discipline. Kudos to the author... for producing a useful and readable cyber-related and national security-focused work.” —Robert J. Bunker, Parameters Author InformationConstance S. Uthoff is associate program director of the Cybersecurity Strategy and Information Management Program at George Washington University. Tab Content 6Author Website:Countries AvailableAll regions |