Show Summary Details
Page of

(p. 410) 27. Cyber-Security 

(p. 410) 27. Cyber-Security
Chapter:
(p. 410) 27. Cyber-Security
Author(s):

Myriam Dunn Cavelty

DOI:
10.1093/hepl/9780198804109.003.0027
Page of

PRINTED FROM OXFORD POLITICS TROVE (www.oxfordpoliticstrove.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in Oxford Politics Trove for personal use (for details see Privacy Policy and Legal Notice).

date: 23 October 2020

This chapter examines the implications of cyber-security for national security. It first provides the necessary technical background on why the information infrastructure is inherently insecure, how computer vulnerabilities are conceptualized, who can exploit them, and how. In particular, it considers definitions and concepts relevant to information security, such as cyberspace, Big Data, and hacking. It then describes three interconnected cyber-security discourses: the first is about computer viruses and worms; the second deals with the interrelationship between cyber-crime and cyber-espionage; the third is concerned with the double-edged sword of fighting wars in the information domain and the need for critical infrastructure protection. Based on this, the chapter evaluates a range of protection measures from each of the three discourses. It concludes by suggesting that the level of cyber-risk is generally exaggerated.

Access to the complete content on Politics Trove requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.

Please subscribe or login to access full text content.

If you have purchased a print title that contains an access token, please see the token for information about how to register your code.

For questions on access or troubleshooting, please check our FAQs, and if you can't find the answer there, please contact us.