+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Cybersecurity in Context. Technology, Policy, and Law. Edition No. 1

  • Book

  • 544 Pages
  • August 2024
  • John Wiley and Sons Ltd
  • ID: 5955202
“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.”
- JOSIAH DYKSTRA, Trail of Bits

“A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber.”
- BRUCE SCHNEIER, author of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back

The first-ever introduction to the full range of cybersecurity challenges

Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject.

Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century’s most important fields.

Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.

Table of Contents

About the Authors xiii

Preface xv

Acknowledgments xix

About the Companion Website xxi

Introduction xxiii

I What is Cybersecurity?

1 What Is Cybersecurity? 3

1.1 What Is the Cyber in Cybersecurity? 5

1.1.1 Cyberspace’s Places and the Problem of Internet Sovereignty 8

1.2 What Is the Security in Cybersecurity? The “CIA” Triad 12

1.2.1 The Internet’s Threat Model 15

1.2.2 Computer Security Versus “Cybersecurity” 19

1.2.3 Security, Innovation, “Hacking” 23

1.2.4 Security from a Private Sector Perspective 24

1.2.5 Building on the CIA Triad 26

1.2.6 Cybersecurity Definitions 27

1.3 Encryption Is Critical in Cybersecurity 28

1.3.1 Modern Cryptosystems 29

1.3.2 Hashing 33

1.4 Cyberpower: How Insecurity Empowers and Undermines Nations 37

1.5 Is Disinformation a Cybersecurity Concern? 40

1.5.1 From Information Scarcity to Glut 41

1.5.2 The Power of Influence Campaigns on the Internet 43

1.5.3 Libicki’s Disinformation Framework 46

1.5.4 The US Approach: Free Speech First 48

1.5.5 Election Interference 50

1.5.6 Is There Really Reason to Be Concerned? 53

1.6 International Views 55

1.7 Conclusion: A Broad Approach 57

2 Technology Basics and Attribution 59

2.1 Technology Basics 60

2.1.1 Fundamentals 60

2.1.2 Reliance Is a Fundamental Element of Computing and the Internet 66

2.1.3 Internet Layers 68

2.1.4 Cybersecurity Depends on Generations of Legacy Technologies 77

2.1.5 “Controlling” the Internet 84

2.1.6 Why Not Start Over? 85

2.2 Attribution 86

2.2.1 Types of Attribution 91

2.2.2 Attribution Process 92

2.2.3 Don’t Be Surprised: Common Dynamics in Attribution 103

2.2.4 The Future of Attribution 106

2.3 Conclusion: An End to Anonymity? 108

II Cybersecurity’s Contours

3 Economics and the Human Factor 111

3.1 Economics of Cybersecurity 112

3.1.1 Asymmetry and the Attack/Defense Balance 116

3.1.2 Incentive “Tussles” 118

3.2 The People Shaping Internet Technology and Policy 120

3.2.1 Tragedies of the Un- managed Commons 124

3.3 The Human Factor - The Psychology of Security 127

3.3.1 Attackers as Behavioral Economists 127

3.3.2 Institutions as Rational Choice Economists 130

3.3.3 User Sophistication 134

3.3.4 The Role of Emotion and the Body 136

3.3.5 Security as Afterthought 138

3.3.6 RCT: The User View 138

3.4 Conclusion 140

4 The Military and Intelligence Communities 141

4.1 Why Cybersecurity Is Center Stage 144

4.2 Are Cyberattacks War? 148

4.2.1 Cyber War Will Not Take Place 148

4.2.2 Cyber War Is Coming 153

4.2.3 The Law of War 155

4.2.4 Cyber Realpolitik 162

4.3 Computers and the Future of Conflict 165

4.3.1 The Changing Nature of Conflict 166

4.4 Cybersecurity and the Intelligence Community 176

4.4.1 The Intelligence Community 178

4.4.2 The Power of the Platform 187

4.4.3 The Vulnerabilities Equities Process 189

4.4.4 Cyber Soldiers and/or Cyber Spies? 193

4.5 Conclusion 195

5 Cybersecurity Theory 197

5.1 Deterrence Theory 198

5.1.1 Deterrence Theory Contours 199

5.1.2 Deterring with Entanglement and Norms 207

5.1.3 Cyber “Power” 209

5.1.4 The Deterrence Theory Critique 213

5.2 Security Studies: Anarchy, Security Dilemma, and Escalation 215

5.2.1 Anarchy 215

5.2.2 The Security Dilemma 216

5.2.3 Escalation and the Security Dilemma 218

5.2.4 Securitization: Nissenbaum Revisited 222

5.2.5 The Problem of Referent Object 223

5.2.6 Nissenbaum’s Alternative Vision: Cyberattacks Are Just Crimes 224

5.2.7 A Response to Nissenbaum: Strategic Risks Do Exist 225

5.3 Economic Theory: The Tragedy of the Cybersecurity Commons 226

5.3.1 The Free Problem 227

5.4 The Public Health Approach 230

5.5 Gerasimov and “Hybrid War:” Information Domain Revisited 233

5.5.1 The US Reaction 235

5.6 Barlowism as Theory 237

5.6.1 Technology Utopianism: The Internet as Democratizing 237

5.6.2 Utopia as No Place, But as Organic 242

5.6.3 High Modernism and Authoritarian High Modernism 243

5.7 Conclusion 246

III Cybersecurity Law and Policy

6 Consumer Protection Law 249

6.1 Federal Trade Commission Cybersecurity 250

6.1.1 FTC’s Legal Authority 252

6.1.2 Unfairness 254

6.1.3 Deception 257

6.1.4 The Zoom Case - Complaint 258

6.1.5 The Zoom Case - Settlement 262

6.2 FTC Adjacent Cybersecurity 267

6.2.1 The Attorneys General 267

6.2.2 Self- regulation 268

6.2.3 Product Recalls 270

6.3 The Limits of the Consumer Protection Approach 271

6.3.1 Two Litigation Moats: Standing and Economic Loss 272

6.3.2 The Devil in the Beltway 275

6.4 Conclusion 279

7 Criminal Law 281

7.1 Computer Crime Basics 282

7.2 Computer Crime Incentive Contours 283

7.3 The Political/Economic Cyber Enforcement Strategy 287

7.4 Cybercrime’s Technical Dependencies 291

7.5 The Major Substantive Computer Crime Laws 293

7.5.1 Identity Theft 294

7.5.2 The Computer Fraud and Abuse Act (CFAA) 297

7.5.3 Other Computer Crime Relevant Statutes 309

7.5.4 Digital Abuse 311

7.6 High- Level Investigative Procedure 312

7.6.1 Investigative Dynamics 312

7.6.2 Investigative Process 317

7.6.3 Obtaining the Data 317

7.6.4 Stored Communications, Metadata, Identity, and “Other” 318

7.7 Live Monitoring 324

7.7.1 International Requests and the CLOUD Act 326

7.7.2 National Security Access Options 329

7.8 Conclusion 332

8 Critical Infrastructure 333

8.1 What Is “Critical Infrastructure” 336

8.2 Political Challenges in Securing Critical Infrastructure 341

8.3 Cyber Incident Reporting for Critical Infrastructure Act of 2022 343

8.4 Technical Dynamics 345

8.4.1 What Does CI Designation Mean 345

8.5 NIST Cybersecurity Framework 346

8.5.1 NIST Broken Down 346

8.5.2 Electricity and Cybersecurity 348

8.6 Alternative Approaches to the NIST Cybersecurity Framework 351

8.6.1 Assessments and Audits - They’re Different 352

8.6.2 Requirements- based Standards 352

8.6.3 Process- Based and Controls- Based Standards 354

8.6.4 Privacy != Security 356

8.6.5 Standards Critiques 357

8.7 The Other CISA - Cybersecurity Information Sharing Act of 2015 358

8.7.1 Information- sharing Theory 358

8.7.2 Information- Sharing Practice 360

8.7.3 Provisions of CISA (the Act) 362

8.8 Conclusion 365

9 Intellectual Property Rights 367

9.1 IPR Problems: Context 368

9.1.1 IP Threats 369

9.1.2 Apt1 371

9 2 Protection of Trade Secrets 373

9.2.1 Reasonable Measures for Protecting Trade Secrets 374

9.2.2 Rights Under the DTSA 375

9.2.3 The Electronic Espionage Act (EEA) 378

9.3 Copyright and Cybersecurity 379

9.3.1 The DMCA and Critical Lessons for Software Testing 385

9.4 Online Abuse and IP Remedies 385

9.4.1 Public Law Remedies for Abuse 387

9.4.2 Private Law Remedies for Abuse 392

9 5 Conclusion 392

10 The Private Sector 393

10.1 There Will Be Blood: Risk and Business Operations 394

10.2 The Politics of Sovereignty 397

10.2.1 Homo Economicus Meets North Korea 400

10.2.2 Technological Sovereignty 402

10.2.3 Committee on Foreign Investment in the United States 404

10.2.4 Data Localization 405

10.2.5 Export Control 406

10.3 The APT Problem 407

10.4 The Security Breach Problem 411

10.4.1 Trigger Information 413

10.4.2 What Is an Incident? What Is a Breach? 414

10.4.3 Notification Regimes 415

10.4.4 Does Security Breach Notification Work? 420

10.5 Hacking Back: CISA (The Statute) Revisited 421

10.6 The Special Case of Financial Services 425

10.6.1 Gramm Leach Bliley Act (GLBA) 425

10.7 Publicly Traded Companies and Cybersecurity 430

10.7.1 Material Risks and Incidents 431

10.7.2 SEC Enforcement 432

10.7.3 The Board of Directors 434

10.8 Cybersecurity Insurance 437

10.8.1 Insurer Challenges 438

10.8.2 Buying Insurance 439

10.9 Conclusion 440

IV Cybersecurity and the Future

11 Cybersecurity Tussles 443

11.1 A Public Policy Analysis Method 444

11.2 Software Liability: Should Developers Be Legally Liable for Security Mistakes? 446

11.3 Technical Computer Security Versus Cybersecurity Revisited 449

11.3.1 The Criminal Law Alternative 450

11.3.2 The Consumer Law Approach 451

11.3.3 The Industrial Policy Approach 451

11.4 Encryption and Exceptional Access 453

11.5 Disinformation Revisited 457

11.5.1 Racist Speech and Cybersecurity 460

11.5.2 What Expectations About Disinformation Are Reasonable? 461

11.6 Conclusion 461

12 Cybersecurity Futures 463

12.1 Scenarios Methods 464

12.2 Even More Sophisticated Cyberattacks 465

12.3 Quantum Computing 466

12.4 Automaticity and Autonomy: Artificial Intelligence and Machine Learning 467

12.5 The Data Trade and Security 470

12.6 The Sovereign Internet 471

12.7 Outer Space Cyber 473

12.8 Classification Declassed 475

12.9 Attribution Perfected or Not 476

12.10 Conclusion 476

V Further Reading and Index

Further Reading 481

Index 495

Authors

Chris Jay Hoofnagle UC Berkeley School of Law. Golden G. Richard, III Louisiana State University.