Abstract
This chapter gives a general overview of this monograph and provides an executive summary of its findings.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Full text available at: http://www.ampere.cnrs.fr/textes/essaiphilosophie/pdf/essaiphilosophiesciences_1.pdf.
- 2.
- 3.
- 4.
«Les moyens d’information et de communication sont devenus les systèmes nerveux de nos sociétés, sans lesquels elles ne peuvent plus fonctionner. Or le «cyberespace», constitue par le maillage de l’ensemble des réseaux, est radicalement différent de l’espace physique: sans frontière, évolutif, anonyme, l’identification certaine d’un agresseur y est délicate» (p. 53).
- 5.
«L’efficacité à tous niveaux des forces de défense et de sécurité dépend et dépendra de plus en plus du bon fonctionnement de leurs systèmes d’information. La planification et l’exécution d’opérations combinées avec des actions cybernétiques tendent en effet à devenir la norme. Avant même que des cibles physiques ne soient détruites, tout système de défense pourra être en effet désorganisé et partiellement aveuglé au travers de frappes silencieuses et ciblées».
- 6.
- 7.
Luiijf et al. (2011).
- 8.
ENISA—National cyber security strategies resource centre: https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map?tab=details.
- 9.
See Steve blank, «The secret history of the Silicon Valley», presentation at UC Berkeley Haas School of Business, Nov. 20, 2008 and associated materials at: https://steveblank.com/secret-history/#Secret%20History%20Backstory.
- 10.
- 11.
See: Arquilla and Ronfeldt (2003) and In Athena’s Camp: Preparing for Conflict in the Information Age, RAND Corporation, 1997. http://www.rand.org/pubs/monograph_reports/MR880.html.
- 12.
Baumard (2000).
- 13.
Dearth and Williamson (1996): 25.
- 14.
Baumard (1993).
- 15.
Arquilla (1994).
- 16.
Grinyer and Norburn (1975).
- 17.
Starbuck (1992).
- 18.
- 19.
Dahl (1996).
- 20.
Ibid., p. 128.
- 21.
The original text is available on the Internet Archive at: https://archive.org/stream/Misc-DoD/Joint%20Pub%203-13-Joint%20Doctrine%20for%20Information%20Operations_djvu.txt.
- 22.
Table extract from Baumard (2000).
- 23.
For a thorough analysis, see Deppe (2005).
- 24.
This principal of inseparability between public information, the Russian people and the State would become the main obstacle for the cooperation of Russia within the international legal framework of the Budapest Convention, a year later, in 2001. The Treaty was never ratified by Russia.
- 25.
Russian Information Security Doctrine, Sept. 9, 2000. Translation and quote from K.M. Deppe, op.cit., p. 26.
- 26.
The new Information Security Doctrine of Russia was enacted on December 5, 2016, revoking the Sept 9, 2000 Pr—1895 framework. It enlarges the initial concept of information security to include: “n this doctrine under the information sphere is understood collection of information, facilities information, information systems and websites in the information and telecommunication network “Internet” (Hereinafter—the “Internet” network), communications networks, information technology, entities, which activity is connected with the formation and information processing, development and use of these technology, information security, as well as the totality of the relevant public regulation mechanisms relationship.”
- 27.
This information was breached in Fireye’s report on APT1, and denied by Chinese authorities. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf.
- 28.
Mandiant/Fireye’ APT1 report, op. cit., p. 3. According to the report: “In 1849 of the 1905 (97%) of the Remote Desktop sessions APT1 conducted under our observation, the APT1 operator’s keyboard layout setting was “Chinese (Simplified)—US Keyboard”. Microsoft’s Remote Desktop client configures this setting automatically based on the selected language on the client system. Therefore, the APT1 attackers likely have their Microsoft operating system configured to display Simplified Chinese fonts. 817 of the 832 (98%) IP addresses logging into APT1 controlled systems using Remote Desktop resolved back to China” ibid., p. 24.
- 29.
Goodman (2010).
References
Arquilla J (1994) The strategic implications of strategic dominance. Strateg Rev 22(3):24–30
Arquilla J, Ronfeldt D (2003) Networks and netwars: The Future of Terror, Crime and Militancy, RAND Corporation
Baumard Ph (1993) From noticing to making sense: using intelligence to develop strategy. Int J Intel Counterintelligence 7(1):29–73
Baumard Ph (1994) From information warfare to knowledge warfare: preparing for the paradigm shift. In: Schwartau W (ed) Information warfare. Thunder’s Mouth Press, New York, pp 611–626
Baumard Ph (2000) From inertia warfare to cognitive warfare: economics of force in cognitive arenas. Martial ecologies: towards a new strategic discourse, Tel Aviv, May 30, conference proceedings, organized by Tel Aviv University and the Jaffee Center for Strategic Studies
Dahl AB (1996) Command dysfunction: minding the cognitive war, a thesis presented to the faculty of the school of advanced airpower studies. Maxwell Air force Base, Alabama
Dearth DH, Williamson CA (1996) Information age, information war: where are we in history? In: Campen AD, Dearth DH, Goodden RT (eds) Cyberwar: security, strategy and conflict in the information age, fairfax. AFCEA, VA
Deppe KM (2005) The media and democracy in Russia, Ph Dissertation, Naval Postgraduate School, Monterey, CA, June, pp 25–30
Goodman W (2010) Cyber deterrence: tougher in theory than in practice? Strateg Stud Q Fall pp 102–135
Grinyer PH, Norburn D (1975) Planning for existing markets: perceptions of executives and financial performance. J R Stat Soc Ser A 138:336–372
Luiijf H, Besseling K, Spoelstra M, de Graaf P (2011) Ten national cyber security strategies: a comparison. In: CRITIS 2011—6th international conference on critical information infrastructures security
Schudel G, Wood B (2000) Adversary work factor as a metric of information assurance. Proceedings of the workshop on new security paradigms pp 23–30
Starbuck WH (1992) Strategizing in the real world. Int J Technol manag Spec Publ Technol Found Strateg Manage 8(1/2)
Stein G (1996) US Information Warfare. Jane’s Information Group, NY
Van Leeuwen B, Stout WMS, Urias V (2015) Operational cost of deploying moving target defenses defensive work factors. Military communications conference, MILCOM IEEE
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Baumard, P. (2017). Introduction. In: Cybersecurity in France. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-54308-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-54308-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54306-2
Online ISBN: 978-3-319-54308-6
eBook Packages: Computer ScienceComputer Science (R0)