Cyber Security in an Information Warfare Age
On October 19th, 2018, the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver hosted its ninth roundtable meeting which covered “Cybersecurity in an Information Warfare Age.” The following presentation was hosted by Dr.
CASIS-Vancouver
doaj +1 more source
Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari +17 more
core +9 more sources
Cyber Attacks, Information Attacks, and Postmodern Warfare
The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare.
Valuch Jozef +2 more
doaj +1 more source
A discourse in conflict : resolving the definitional uncertainty of cyber war : a thesis presented in partial fulfilment for the requirements for the degree of Master of Arts in Defence and Security Studies at Massey University, Albany, New Zealand [PDF]
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved.
Hughes, Dan
core
Managing cyberattacks in wartime: The case of Ukraine
Abstract Cybersecurity specialists face continual challenges in protecting organizations and societies from ever‐evolving cyberattacks. These challenges intensify dramatically in the context of war, yet our understanding of cyberattacks during wartime is limited.
Iryna Fyshchuk +2 more
wiley +1 more source
The Intersection of Law and Ethics in Cyberwar: Some Reflections [PDF]
The purpose of this short essay is to reflect upon a few issues that illustrate how legal and ethical issues intersect in the cyber realm. Such an intersection should not be especially surprising., Historian Geoffrey Best insists, “[I]t must never be ...
Dunlap, Charles J., Jr.
core +1 more source
Adapting cybersecurity maturity models for resource‐constrained settings: A case study of Peru
Abstract Developing countries are rapidly embracing digitalization, but this exposes them to heightened cybersecurity risks. They often look to standard established cybersecurity models from developed countries to build their national defenses. However, significant developmental, political, social, and economic differences can render these models ...
GangSeok Lee +4 more
wiley +1 more source
This study will evaluate the transition from conventional combat methods to a technology-driven battlefield. In particular, the Lebanon-Israel conflict serves a crucial case study to analyze how digital tools and AI reshape battlefield strategies ...
Sereina Khalifeh
doaj +1 more source
Peace and the digital revolution: Toward “cyberpeace?”
Abstract This article will explore challenges posed by the digital communications revolution to some long‐standing concepts and assumptions around security, warfare, and peace. It will demonstrate the obsolescence of the traditional state‐focused national security paradigm with regards to matters of cybersecurity, as well as the limitations of ...
Paul Antony White
wiley +1 more source
Current Issues of Information Support of Russian Foreign Policy in the New Political Environment
Introduction. In the context of growing anti-Russian information wars, intensive and sharp ideological confrontation active information support of Russia’s foreign policy becomes more and more crucial. Methods. Authors use mainly the methods of expert
Petr V. Menshikov, Aida Ya. Neymatova
doaj +1 more source

