2007
DOI: 10.7249/cb407
|View full text |Cite
|
Sign up to set email alerts
|

Conquest in Cyberspace: National Security and Information Warfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0
10

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(45 citation statements)
references
References 0 publications
0
35
0
10
Order By: Relevance
“…Attacks may also cause much indirect damage because of interdependencies that may not be obvious at first (Borg, 2005). Attacks may also fail for a host of unforeseen reasons; (Libicki, 2007) likens information warfare to introducing noise into a military organization, and the organization may or may not succeed at handling it.…”
Section: Damage Assessmentmentioning
confidence: 99%
“…Attacks may also cause much indirect damage because of interdependencies that may not be obvious at first (Borg, 2005). Attacks may also fail for a host of unforeseen reasons; (Libicki, 2007) likens information warfare to introducing noise into a military organization, and the organization may or may not succeed at handling it.…”
Section: Damage Assessmentmentioning
confidence: 99%
“…Cyber-warfare does not rely on the physical distances between targets, and as such depends on the attacker's or defender's ability to have control over the other's cyberspace. As discussed in [29], the tools and techniques required to start a cyber-warfare can be available to both the attacker and the defender, and requires no forced entry [30]. One of such tools is strongly connected to zero-day vulnerabilities and a prolonged window of exposure for which patches of vulnerabilities are released, made public and installed.…”
Section: Cyber-warfare and National Readinessmentioning
confidence: 99%
“…They can be malicious software installed secretly through concealed downloads or deliberate plants by human agents, or they can be malicious data or maliciously delivered data as in denial-of-service attacks. Cyberweapons are a growing component in military arsenals (Libicki, 2007). Increasingly countries are instituting "cyberattack corps" with capabilities to launch attacks in cyberspace on other countries as an instrument of war, either alone or combined with attacks by conventional military forces (Clarke and Knake, 2010).…”
Section: Introductionmentioning
confidence: 99%