The U.S. cybersecurity and intelligence analysis challenges / John Michael Weaver.
2022
HV6773.15.C97 W43 2022
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
The U.S. cybersecurity and intelligence analysis challenges / John Michael Weaver.
ISBN
9783030958411 (electronic bk.)
3030958418 (electronic bk.)
9783030958404
303095840X
3030958418 (electronic bk.)
9783030958404
303095840X
Published
Cham : Palgrave Macmillan, [2022]
Copyright
©2022
Language
English
Description
1 online resource : illustrations
Item Number
10.1007/978-3-030-95841-1 doi
Call Number
HV6773.15.C97 W43 2022
Dewey Decimal Classification
363.3250973
Summary
One of the prevailing issues regarding security to North America and more pointedly, the United States, gravitates on the topic of cyber threats confronting this nation. These threats are becoming more disruptive and destructive and many nations' infrastructure is vulnerable to them. This book makes use of a qualitative research methodology looking at a conventional understanding of the four instruments of power that include diplomacy, information, military and economic (D.I.M.E.) efforts through the use of the York Intelligence Red Team Model-Cyber (Modified) and seeing how adversaries are using them against the United States. Moreover, this project uses secondary data and makes use of the Federal Secondary Data Case Study Triangulation Model to ensure a balance of sources to dissect the problem. John M. Weaver is Associate Professor of Intelligence Analysis at York College of Pennsylvania, the US.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 11, 2022).
Series
Palgrave pivot.
Available in Other Form
Print version: 9783030958404
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Chapter 1 Introduction and Background
Chapter 2 Research Questions, Methodology, and Limitations
Chapter 3 The United States (an Overview)
Chapter 4 Al Qaeda
Chapter 5 People's Republic of China (PRC)
Chapter 6 Islamic Republic of Iran (Iran)
Chapter 7 Islamic State (IS)
Chapter 8 Democratic People's Republic of Korea (DPRK)
Chapter 9 Russian Federation (Russia)
Chapter 10 Analysis and Findings
Chapter 11 Conclusion.
Chapter 2 Research Questions, Methodology, and Limitations
Chapter 3 The United States (an Overview)
Chapter 4 Al Qaeda
Chapter 5 People's Republic of China (PRC)
Chapter 6 Islamic Republic of Iran (Iran)
Chapter 7 Islamic State (IS)
Chapter 8 Democratic People's Republic of Korea (DPRK)
Chapter 9 Russian Federation (Russia)
Chapter 10 Analysis and Findings
Chapter 11 Conclusion.