Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Cyber-attacks have become increasingly common in recent years. Capable of shutting down nuclear centrifuges, air defense systems, and electrical grids, cyber-attacks pose a serious threat to national security. As a result, some have... more
    • by 
    •   6  
      Political ScienceCyber WarfareWarUnited States
Cyber-attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber-attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber-attacks that can... more
    • by 
    •   15  
      Cyber-Physical SystemsCyber ConflictCyber WarfareStuxnet
The purpose of the article is to analyse Operation “Olympic Games” including, in particular, to indicate the political background to the activities aimed at preventing the development of Iran’s nuclear programme, and to examine the... more
    • by 
    •   14  
      Intelligence StudiesIntelligenceInternational SecurityCybersecurity
Cyber-deterrence has become a fashionable concept, and there has been a wealth of literature and polemic produced which seeks to simplify it, sell it as an applicable theory and fight for its insertion into national security strategies;... more
    • by 
    •   22  
      Computer ScienceInternational RelationsCybercrimesNetwork Security
En ayant recours à Stuxnet, la première arme entièrement composée de codes, afin d’attaquer le programme nucléaire iranien, les Etats-Unis ont ouvert une brèche : celle de l’émergence du cyberespace comme nouvel espace de lutte. En... more
    • by 
    •   2  
      Cyber SecurityStuxnet
This article argues that some core tenets of Actor-Network Theory (ANT) can serve as heuristics for a better understanding of what the stakes of cyber-security are, how it operates, and how it fails. Despite the centrality of... more
    • by 
    •   12  
      Critical TheoryInternational RelationsActor Network TheoryCritical Security Studies
Schwartau (1994) defined information warfare as the application of information and communication technologies to compromise or access an adversary’s technological infrastructure. The purpose is to control, disrupt, disable or access it... more
    • by 
    •   10  
      Information TechnologyInformation SecurityCybercrimesSocial Engineering
On June 17th, 2010, security researchers at a small Belarusian firm known as VirusBlockAda identified malicious software (malware) that infected USB memory sticks.1 In the months that followed, there was a flurry of activity in the... more
    • by 
    •   6  
      Information SecurityCyberstudiesCyber WarfareComputer Malware
Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. Technological advances have profoundly impacted everyday life by introducing creative inventions that were once... more
    • by 
    •   10  
      TechnologyUnconventional Warfare (UW)CyberwarfareSocial Engineering
Este trabalho tem como objetivo compreender de que modo a temática da ciberguerra pode vir a modificar o nosso quotidiano e as ações do Estado para prevenir inconvenientes que esta possa vir a causa, não só na esfera pessoas, como... more
    • by 
    •   3  
      Cyber WarfareCyber SecurityStuxnet
This article aims to provide a balanced picture of the phenomenon of cyberwar. It will show how and why the meaning of “cyberwar” has evolved from the narrow conception referring exclusively to military interaction to its broad meaning,... more
    • by 
    •   4  
      Strategic StudiesCyberwarfareCybersecurityStuxnet
Devletler için siber saldırılar gün geçtikçe güvenlik sorunu üreten bir alan olmaktadır. Askeri sistemlerin, ekonomik sistemlerin ve devlet enformasyon sistemlerini devre dışı bırakma ya da kontrolü ele geçirme yeteneklerine sahip olan... more
    • by 
    •   4  
      Iranian StudiesStuxnetSiber SaldırıUluslararası Hukuk
The new technologies that are being deployed in conflicts are having negative ramifications as it endangers civil populations and might disrupt the social order. Conflict is changing, but some traits are remaining the same ex. policies... more
    • by 
    •   4  
      Conflict AnalysisCyber SecurityStuxnetCyber War
    • by 
    •   4  
      Computer ScienceCyber WarfareIranStuxnet
With the 2016 US Presidential Election, the question of cyber-security entered the mainstream and set the focus on how nations and other entities use cyber-space as an extension of their "real-world" agendas. This question is by no means... more
    • by 
    •   18  
      International RelationsGeopoliticsInternational SecurityDeterrence
    • by 
    •   5  
      Information SecurityComputer SecuritySCADACyber Security
Executive Summary The Hybrid War embodies a number of conflicts that occurred in the last two decades. The central hypothesis is that the relationship between security and technology has accelerated the transition from traditional kinds... more
    • by 
    •   11  
      Russian Foreign PolicyCyber WarfareAsymmetrical WarfareStuxnet
As states continue to explore and prepare for war in the cyber-domain, these new weapons are still yet to find their place among larger strategy in conflict. This paper analyzes Operations Orchard and Olympic Games, the two most... more
    • by 
    •   7  
      Strategy (Military Science)International SecurityCyber WarfareCyber Security
O tema deste trabalho envolve um case de política externa estadunidense atrelada a uma política de defesa cibernética audaciosa, no que tange ao programa nuclear iraniano. Mais precisamente, analisam-se os impactos estratégicos trazidos... more
    • by 
    •   6  
      PhilosophyStuxnetDefesa CibernéticaEstados Unidos Da América
    • by 
    •   6  
      International RelationsIranian Nuclear ProgramStuxnetCIA
Information and communication technology changed the way we live, learn and even fight. Information is not only a military supplementary means anymore, but a target itself. Computer network attacks (CNAs) are able to make widespread... more
    • by 
    •   6  
      International Humanitarian LawCyber LawCyber Attack AttributionStuxnet
A command control system refers to a general control system, of a production system, of a process, or of another type of dynamic system, wherein the control elements are not centralized, but are distributed throughout the system; and each... more
    • by 
    •   5  
      Computer ScienceInformation SecurityDistributed SystemsStuxnet
    • by 
    •   33  
      CyberlawTerrorismInternational TerrorismCybercrimes
"Elevated age in cyber warfare Malware has become focused SCADA Systems (Stuxnet) Malware performs Operational Preparation of the Environment (OPE) Conficker (Millions still infected) Ransomeware Data is being held hostage The... more
    • by 
    •   80  
      EntrepreneurshipEuropean StudiesMilitary IntelligenceTactics (Military Science)
Este artigo argumenta sobre a emergência da ciberguerra como nova forma de conflito internacional. É feita uma introdução à temática da guerra no ciberespaço, seguida de uma contextualização histórica que abrange o nascimento da ARPAnet1... more
    • by 
    •   18  
      Information TechnologyInternet StudiesPower (social)Cold War and Culture
Günümüzde büyük bir ironi olarak nükleer silahlara sahip olan ülke sayısı 10’u geçmiyorken, siber silahlara sahip ülke sayısı kesin olarak bilinmemekte ve siber silahlara sahip olan ülke sayısının nükleer silahlara sahip olan ülke... more
    • by 
    •   5  
      Cyber crimeCyber SecurityStuxnetSiber Güvenlik
    • by 
    •   5  
      Cyber WarfareWarUnited StatesStuxnet
    • by 
    •   21  
      American StudiesComputer Security And ReliabilityInternational RelationsSocial Sciences
A short paper on the troubles of Stuxnet
    • by 
    •   10  
      CybercrimesThe InternetComputer Virusmetamorphic Virus
Özet Bilgisayar ve internet kullanımı, bilişim teknolojilerinin gelişmesiyle tüm dünyada yaygınlaşarak artmıştır. Bu artan kullanım insanlara birçok açıdan kolaylık sağlasa da, bir siber dünya sistemi yaratmıştır. Bu sistem, güvenlik... more
    • by 
    •   4  
      StuxnetSiber GüvenlikSiber Savaşstuxnet Virus
O tema deste trabalho envolve um case de política externa estadunidense atrelada a uma política de defesa cibernética audaciosa, no que tange ao programa nuclear iraniano. Mais precisamente, analisam-se os impactos estratégicos trazidos... more
    • by  and +1
    •   4  
      StuxnetDefesa CibernéticaEstados Unidos Da AméricaAnálise De Política Externa
The Internet threats can affect anyone and even cause tremendous financial damage to organizations or even countries, while the mitigation of such threats can be very difficult, considering the highly sophisticated nature of attacks that... more
    • by 
    •   31  
      Information SystemsComputer ScienceInformation TechnologyGame Theory
The potential for cyberwarfare is vast and is of concern to all nations, and national security defence. It appears that many countries are actively trying to protect their computer networks, whilst looking for ways that might bring down... more
    • by 
    •   7  
      International RelationsInformation OperationsComputer NetworkNorth Korea
    • by 
    •   2  
      StuxnetFlame
A profound degree of consternation exists within the private and public realm because of the lack of a defined line that is being crossed that warrants a nation-supported military response. For example, the attack and destruction of the... more
    • by 
    •   14  
      Information SystemsInformation TechnologyInformation ManagementInformation Warfare
Resumo Este artigo debate o tema da apropriação da tecnologia na ciberguerra e está organizado em três partes. Na primeira, temos a introdução ao tema das TIC1 e novos media e a sua explosão na década de 90. Numa segunda parte, fazemos... more
    • by 
    •   12  
      Information TechnologyPhilosophy of TechnologyTechnologySocial Networking
The purpose of the article is to analyse Operation "Olympic Games" including, in particular, to indicate the political background to the activities aimed at preventing the development of Iran's nuclear programme, and to examine the... more
    • by 
    •   9  
      IntelligenceInternational SecurityCybersecurityStuxnet
... on-iran. html, quoting the semi-official Mehr News Agency; 'Iran Identifies Sources of Stuxnet Virus in its Computers', Radio Samaneh/Payvand.com, 21 October 2010, http://www.payvand.... more
    • by 
    •   6  
      Political ScienceIranian StudiesCyber WarfareSurvival
    • by 
    •   32  
      Film StudiesIntelligence and EspionageCinemaTennyson
    • by 
    •   8  
      JournalismPhotographyVisual CultureConflict
El 17 de Junio de 2010, investigadores de seguridad en una pequeña empresa belarusa conocida como VirusBlockAda identificó un software malicioso (malware) que infectó memorias USB. En los meses siguientes, hubo una oleada de actividades... more
    • by 
    •   6  
      Information SecurityCyberstudiesCyber WarfareComputer Malware
Stuxnet is arguably the world’s best known piece of Industrial Control System malware that was apparently used to sabotage nuclear plant equipment at Iran’s Natanz facility. The malware did damage to a lot of critical equipment in that... more
    • by 
    •   9  
      Control Systems EngineeringComputer ScienceComputer NetworksComputer Security
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related... more
    • by 
    •   20  
      Social NetworkingInformation WarfareInformation OperationsCyber Warfare
    • by 
    •   3  
      Political ScienceCyber WarfareStuxnet
    • by 
    •   6  
      SociologyResiliencePolitical SciencePolitics
    • by 
    •   14  
      CriminologyInformation SecurityTerrorismCybercrimes
Güvenlik çalışmaları bir devletin olmazsa olmazıdır. Zira devletlerin asıl görevi insanlarını korumaktır. Küreselleşmeyle birlikte dünyada " sınır " diye tanımlanan kırmızı çizgiler her geçen gün daha da geçirgen hale gelirken internet... more
    • by 
    •   18  
      International RelationsInformation SecurityTerrorismCybercrimes