Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber war : the next threat to national security and what to do about it
Clarke R., Knake R., HarperCollins, New York, NY, 2010. 304 pp. Type: Book (978-0-061962-23-3)
Date Reviewed: Oct 28 2010

The argument that international warfare can be carried out in cyberspace has been evaluated by many as warmongering. This book aims to counter those opinions by providing anecdotal evidence that cyber war is not only a distinct possibility, but that various nations have supposedly been pursuing various forms of cyber war in recent years.

Chapter 1 looks at famous distributed denial-of-service (DoS) attacks. Chapter 2 looks at the strategies of various nations, including China and Russia, to prepare for information warfare. Chapter 3 provides a basic understanding of cyberspace; for example, one section is on “How and Why Cyber War is Possible.” Chapter 4 provides a brief look at work done over the last 20 years, at both the policy and technical levels, to secure cyberspace.

Chapter 5 laments the absence of any formal US strategy regarding cyber war, and it goes on to stress the need for a credible defense and to propose a defense strategy. Chapter 6 looks at the other side of the coin: offense. Chapter 7 turns the discussion on its head by considering the steps needed to prevent cyber war through diplomacy and multipartite agreements. The last chapter sets a forward-looking agenda, defining steps that need to be taken in order to avoid disaster.

The underlying message throughout the book is that the US, because of its inability to defend against sophisticated cyber attacks, is not ready. Clarke, the main author, has a flair for dramatics, and his use of unverifiable anecdotal incidents in the first half of the book supports the points presented in the second half.

In order to prepare for a future where various systems become more automated and more dependent on other complex and often evolving cyber systems, it is worth paying attention to Clarke and Knake’s warnings and using the strategy framework presented in the book. The book will be of interest to those who want to evaluate the issue, without being encumbered by theoretical [1] and technical [2] details.

Reviewer:  Srijith Nair Review #: CR138533 (1109-0924)
1) Kramer, F.D.; Starr, S.H.; Wentz, L.K. Cyberpower and national security . Potomac Books, Washington, DC, 2009.
2) Carr, J. Inside cyber warfare. O’Reilly Media, Inc., Sebastopol, CA, 2010.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy