Results 281 to 290 of about 1,657,998 (333)
Some of the next articles are maybe not open access.
War by other means [cyber war]
Engineering & Technology, 2018A DECADE AGO, Russian tanks rolled into South Ossetia, a northern province of Georgia. Even before they started moving, a 'third force' had already embarked on an exercise of hacking into government computer networks and local news agencies. Although the latest edition of the 'Tallinn Manual' on cyber warfare tackles the question of legal retaliation ...
openaire +1 more source
2007
Cyber war is real and is being waged. Cyber terrorists and cyber warriors are attacking systems, but fortunately, they are attacking systems in much the same way hackers attack systems. This is good for system security designers as the security controls installed to protect against hacking will work to protect against cyber terrorists and warriors ...
openaire +1 more source
Cyber war is real and is being waged. Cyber terrorists and cyber warriors are attacking systems, but fortunately, they are attacking systems in much the same way hackers attack systems. This is good for system security designers as the security controls installed to protect against hacking will work to protect against cyber terrorists and warriors ...
openaire +1 more source
Cyber War Retaliation Decision
International Journal of Cyber Warfare and Terrorism, 2011Information Communication Technology (ICT) has become a core part of every organization. Any disruption in ICT’s main infrastructure may have severe impacts and lead to huge losses. Governmental and military institutions’ facilities, networks, and infrastructure are no exception. Defending the ICT military and public installations and infrastructure is
openaire +1 more source
2014
One of the key questions in the debates around the likelihood and seriousness of the cyber warfare threat is whether any of the attacks we have seen in recent years constitute solid examples of cyber warfare, in this chapter, a number of much analysed and discussed instances of conflict involving a cyber element are reviewed, from the 1980s to the ...
openaire +2 more sources
One of the key questions in the debates around the likelihood and seriousness of the cyber warfare threat is whether any of the attacks we have seen in recent years constitute solid examples of cyber warfare, in this chapter, a number of much analysed and discussed instances of conflict involving a cyber element are reviewed, from the 1980s to the ...
openaire +2 more sources
Computer Fraud & Security, 2000
Abstract Well over two thirds of the major companies, including financial and medical institutions, in the United States have admitted suffering financial loss from security breaches on the Internet. The findings, published by the Computer Security Institute, relate only to the USA but are, according to a leading British solicitor specializing in ...
openaire +1 more source
Abstract Well over two thirds of the major companies, including financial and medical institutions, in the United States have admitted suffering financial loss from security breaches on the Internet. The findings, published by the Computer Security Institute, relate only to the USA but are, according to a leading British solicitor specializing in ...
openaire +1 more source
Cybercrime, cyberweapons, cyber wars
Communications of the ACM, 2013Where reality stops and perception begins.
openaire +1 more source
Special Operations Journal, 2018
Immediately after the 9/11 attacks America readied itself to strike back against those it knew to be responsible.
openaire +1 more source
Immediately after the 9/11 attacks America readied itself to strike back against those it knew to be responsible.
openaire +1 more source
Journal of Strategic Studies, 2012
The author adresses the question if there is something called cyber war? He challenges the commonly accepted conclusion that cyber war is inevitably. While acknowledging the reality of cyber threats, he argues that most threats and incidents are actually better qualified as sabotage, espionage and subversion.
openaire +2 more sources
The author adresses the question if there is something called cyber war? He challenges the commonly accepted conclusion that cyber war is inevitably. While acknowledging the reality of cyber threats, he argues that most threats and incidents are actually better qualified as sabotage, espionage and subversion.
openaire +2 more sources
2009
Cyberspace offers the prospect of sub rosa warfare, in which neither side acknowledges that they are in conflict with one another or even that one side has been attacked at all. This is possible for two reasons: first, because the battle damage from some types of cyber attack may not be globally visible, and second because attribution can be very ...
openaire +1 more source
Cyberspace offers the prospect of sub rosa warfare, in which neither side acknowledges that they are in conflict with one another or even that one side has been attacked at all. This is possible for two reasons: first, because the battle damage from some types of cyber attack may not be globally visible, and second because attribution can be very ...
openaire +1 more source
Cyber War versus Cyber Realities: Cyber Conflict in the International System
Small Wars & Insurgencies, 2016In February 2015, US Director of National Intelligence James Clapper in his annual report to Congress named the cyber threat as the number one strategic threat to the United States, placing it ahea...
openaire +1 more source

