2011
DOI: 10.1109/msp.2011.138
|View full text |Cite
|
Sign up to set email alerts
|

Principles of Cyberwarfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
16
0
13

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(29 citation statements)
references
References 2 publications
0
16
0
13
Order By: Relevance
“…Cyber-warfare does not rely on the physical distances between targets, and as such depends on the attacker's or defender's ability to have control over the other's cyberspace. As discussed in [29], the tools and techniques required to start a cyber-warfare can be available to both the attacker and the defender, and requires no forced entry [30]. One of such tools is strongly connected to zero-day vulnerabilities and a prolonged window of exposure for which patches of vulnerabilities are released, made public and installed.…”
Section: Cyber-warfare and National Readinessmentioning
confidence: 99%
“…Cyber-warfare does not rely on the physical distances between targets, and as such depends on the attacker's or defender's ability to have control over the other's cyberspace. As discussed in [29], the tools and techniques required to start a cyber-warfare can be available to both the attacker and the defender, and requires no forced entry [30]. One of such tools is strongly connected to zero-day vulnerabilities and a prolonged window of exposure for which patches of vulnerabilities are released, made public and installed.…”
Section: Cyber-warfare and National Readinessmentioning
confidence: 99%
“…Cyber war is part of an underground and obscure arms race, where nations invest billions of dollars to establish digital armies and stocks of digital weapons -for example malicious software codes that are politically motivated, as exemplified by the Stuxnet worm that disrupted and disabled the centrifugal equipment of an Iranian nuclear facility (Langner, 2013). Exacerbating the potential dangers of cyber warfare is the fact that no individual, organisation or government can provide an accurate profile of the vulnerability, threat and risk landscapes evolving in, and emanating from, cyberspace (Mbanaso & Dandaura, 2015;Parks & Duggan, 2011).…”
Section: Mbanasomentioning
confidence: 99%
“…Another key point that should be understood in this context is the nature of the conspiracy and conflicts, which is, fundamentally, knowledge-based (Parks & Duggan, 2011;Shen & Nettis, 2016). It is not going to be business as usual, i.e., not a matter of buying tanks and weapons, as was the case in the traditional arms race.…”
Section: Mbanasomentioning
confidence: 99%
See 1 more Smart Citation
“…Cyberspace is defined as "an operational domain whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange and exploit information via interconnected ICT-based systems and their associated infrastructures" [30]. Thus, cyber warfare is the kind of war that happens in that space in contrast with the traditional kinetic warfare where physical weapons are used.…”
mentioning
confidence: 99%