{"id":21943,"date":"2016-11-25T05:00:27","date_gmt":"2016-11-25T13:00:27","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=21943"},"modified":"2020-04-21T14:22:50","modified_gmt":"2020-04-21T21:22:50","slug":"cybersecurity-canon-cybersecurity-cyberwar","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/11\/cybersecurity-canon-cybersecurity-cyberwar\/","title":{"rendered":"The Cybersecurity Canon: Cybersecurity and Cyberwar"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/10\/Big-Canon-Banner.png\"><div style=\"max-width:100%\" data-width=\"1140\"><span class=\"ar-custom\" style=\"padding-bottom:17.11%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-full wp-image-20520 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/10\/Big-Canon-Banner.png\" alt=\"big-canon-banner\" width=\"1140\" height=\"195\" \/><\/span><\/div><\/a><\/p>\n<p><em>We modeled the\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Canon<\/a>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/nominate-a-book\" target=\"_blank\" rel=\"noopener noreferrer\">directly participate in the process<\/a>. Please do so!<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/cyber-security-canon-bios.html\" target=\"_blank\" rel=\"noopener noreferrer\">Book Review by\u00a0Canon Committee Member, Brian Kelly<\/a>:\u00a0<em>Cybersecurity and Cyberwar: What Everyone Needs to Know<\/em>\u00a0(2014)<em>\u00a0<\/em>by\u00a0P. W. Singer and Allan Friedman<\/p>\n<h3>Executive Summary<\/h3>\n<p><em>Cybersecurity and Cyberwa<\/em>r is part of a series of books entitled \u201cWhat Everyone Needs to Know,\u201d written by leading authorities in their given fields. Each volume in the series offers a balanced and authoritative primer on complex current events. Authors P. W. Singer and cyber expert Allan Friedman provide an easy read for new readers to the topic of cybersecurity and cyberwar while also being an informative and resourceful reference book for more seasoned cyber professionals.<\/p>\n<p>Cybersecurity issues affect us as individuals, as businesses and as a nation. Every aspect of our lives fundamentally depends on the internet. The book is structured around the key questions surrounding cyberspace and its security: how it all works, why it matters, and what can we do?<\/p>\n<h3>Review<\/h3>\n<p>I found <em>Cybersecurity and Cyberwar: What Everyone Needs to Know<\/em> to be an enjoyable read, filled with engaging (funny) stories and illustrative anecdotes. Readers are taken on an entertaining tour of the important issues, history and characters of cybersecurity, from the Anonymous hacker group and the Stuxnet computer virus to the cyber units of the Chinese and U.S. militaries.<\/p>\n<p>The book is divided into three main sections: Part I: \u201cHow It All Works\u201d provides an overview of the internet, its history, and how it works; Part II: \u201cWhy It Matters\u201d lays out a framework and taxonomy for \u201ccyber\u201d and \u201ccyberattacks,\u201d and then moves to an examination of the various threats (from criminals to nation-states to patriotic hackers), covering both how and why attacks are carried out; and finally, Part III: \u201cWhat Can We Do?\u201d is a section on what can be done from both a personal and public policy level.<\/p>\n<p>For readers without a military or public policy background this book will provide a common base of knowledge around cybersecurity issues. As cybersecurity practitioners, having a common base of knowledge will allow us to cooperatively engage in a dialogue and much-needed conversation around how to approach, understand and deal with the important policy implications of cybersecurity and cyberwar.<\/p>\n<p>Cooperation is a key theme and takeaway from the book, focusing on how difficult, yet necessary, cooperation is for addressing cybersecurity issues. Today we talk in terms of \u201cthreat intelligence sharing.\u201d The authors suggest that a governance model based on the U.S. Centers for Disease Control and Prevention could serve to encourage cooperation, disseminate information and recommendations, and mobilize rapid responses as needed. Understanding, communication and cooperation in cybersecurity are truly what everyone needs to know.<\/p>\n<h3>Conclusion<\/h3>\n<p>As cybersecurity professionals, we face new challenges, questions and threats in cyber daily. The subtitle of this book is \"What Everyone Needs to Know,\" and that changes rapidly in cyberspace. Two plus years after this book was published, policymakers and members of the public alike still know little about the nature and seriousness of these threats. I recommend this as a must read from a foundational perspective of both cybersecurity and cyberwar for cybersecurity practitioners \u2013 and everyone else.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We modeled the\u00a0Cybersecurity Canon\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from &hellip;<\/p>\n","protected":false},"author":153,"featured_media":15556,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[251],"coauthors":[1607],"class_list":["post-21943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-canon","tag-cybersecurity-canon"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=21943"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21943\/revisions"}],"predecessor-version":[{"id":109895,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/21943\/revisions\/109895"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/15556"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=21943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=21943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=21943"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=21943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}