Show Summary Details
Contemporary Security Studies

Contemporary Security Studies (6th edn)

Alan Collins
Page of

Printed from Oxford Politics Trove. Under the terms of the licence agreement, an individual user may print out a single article for personal use (for details see Privacy Policy and Legal Notice).

date: 01 April 2023

p. 42228. Cyber-Securitylocked

p. 42228. Cyber-Securitylocked

  • Myriam Dunn Cavelty


This chapter looks at what makes cyber-security a key national security issue. Section 28.2 provides background information to understand why cyberspace is insecure and what it takes to hack a system. Section 28.3 looks at different types of politically relevant cyber-operations, describing hacktivism, cyber-crime, cyber-espionage, cyber-terrorism, and cyber-war, among others. Section 28.4 puts the threat into perspective, exploring the realities of cyber-conflict. The debate has shifted from scenarios of imminent cyber-doom to the observable reality of often stealthy, sometimes disruptive operations under the threshold of war. Section 28.5 details selected protection concepts that help to reduce cyber-risks.

You do not currently have access to this chapter

Sign in

Please sign in to access the full content.


Access to the full content requires a subscription