Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. The author defines the concept of cyber blockades and presents a comparison of blockade operations in five different domains.
Strategic A2/AD in Cyberspace focuses on exclusion from cyberspace, or the ability of a state to be cut off entirely from cyberspace. Strategic anti-access and area denial (A2/AD) operations are common in other domains, but, before now, they have not been examined for their relevance to cyberspace. This book examines how strategic A2/AD operations can cut off states from cyberspace through attacks at either the physical or logic layers of cyberspace. The result of strategic cyber A2/AD operations could be catastrophic for modern economies, governments, military forces, and societies, yet there has been surprisingly little study of these threats to states' access to cyberspace. This book examines the implications of strategic cyber A2/AD operations for deterrence strategy and proposes a new view of how exclusion from cyberspace can be used as a coercive tool in diplomacy.
Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. The author defines the concept of cyber blockades and presents a comparison of blockade operations in five different domains.
Strategic A2/AD in Cyberspace focuses on exclusion from cyberspace, or the ability of a state to be cut off entirely from cyberspace. Strategic anti-access and area denial (A2/AD) operations are common in other domains, but, before now, they have not been examined for their relevance to cyberspace. This book examines how strategic A2/AD operations can cut off states from cyberspace through attacks at either the physical or logic layers of cyberspace. The result of strategic cyber A2/AD operations could be catastrophic for modern economies, governments, military forces, and societies, yet there has been surprisingly little study of these threats to states' access to cyberspace. This book examines the implications of strategic cyber A2/AD operations for deterrence strategy and proposes a new view of how exclusion from cyberspace can be used as a coercive tool in diplomacy.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.