Book contents
- Managing Cyber Attacks in International Law, Business, and Relations
- Managing Cyber Attacks in International Law, Business, and Relations
- Copyright page
- Dedication
- Dedication
- Contents
- Tables and Figures
- Foreword
- Preface
- Acknowledgments
- Abbreviations
- Part I Foundations of Polycentric Governance in Cyberspace
- Part II Managing Vulnerabilities
- 3 Hacking the Planet, the Dalai Lama, and You
- 4 The New CyberWarfare
- 5 Risky Business
- Part III The Law, Politics, and Promise of Cyber Peace
- Appendix
- Index
5 - Risky Business
Enhancing Private-Sector Cybersecurity
from Part II - Managing Vulnerabilities
Published online by Cambridge University Press: 05 June 2014
- Managing Cyber Attacks in International Law, Business, and Relations
- Managing Cyber Attacks in International Law, Business, and Relations
- Copyright page
- Dedication
- Dedication
- Contents
- Tables and Figures
- Foreword
- Preface
- Acknowledgments
- Abbreviations
- Part I Foundations of Polycentric Governance in Cyberspace
- Part II Managing Vulnerabilities
- 3 Hacking the Planet, the Dalai Lama, and You
- 4 The New CyberWarfare
- 5 Risky Business
- Part III The Law, Politics, and Promise of Cyber Peace
- Appendix
- Index
Summary
- Type
- Chapter
- Information
- Managing Cyber Attacks in International Law, Business, and RelationsIn Search of Cyber Peace, pp. 197 - 260Publisher: Cambridge University PressPrint publication year: 2014