Abstract: Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Publication Year: 2009
Publication Date: 2009-09-22
Language: en
Type: book
Access and Citation
Cited By Count: 426
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot