Blog Posts Tagged with "Cyber Warfare"

0ff0a77035f9569943049ed3e980bb0d

Cyber Shafarat 2012: Cyber Warfare, OpSec and Intelligence

January 30, 2012 Added by:

Cyber criminals, nation-states, hacktivists and other adversaries have different approaches to circumventing cyber defenses. They execute sometimes sophisticated, sometimes simple-minded attacks designed to use and exploit threat vectors as required to accomplish the task...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

All Out Cyber War: Analysis of the Middle-Eastern Conflict

January 29, 2012 Added by:Rafal Los

You just can't avoid it, so I had to write it. The escalation of rhetoric has gone past media hype and has spilled over into mainstream politics, and now onto the lips of people who should really know better than to perpetuate some of this madness...

Comments  (4)

0ff0a77035f9569943049ed3e980bb0d

Roadmap to Exploitation: The OIG Imperative to Publish or Perish

January 23, 2012 Added by:

The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?

Comments  (9)

03b2ceb73723f8b53cd533e4fba898ee

The Chinese Cyber Threat: Japan Under Attack

January 23, 2012 Added by:Pierluigi Paganini

China is a cyber power capable of destroying most any opponent, especially when going against companies in trouble because of the difficult economy situation. These companies are the most vulnerable members of the security chain and therefore a favorite target...

Comments  (6)

B64e021126c832bb29ec9fa988155eaf

China’s “Online Blue Army” Ready

January 19, 2012 Added by:Dan Dieterle

Growing up I heard numerous times that the Soviet's needed so many missiles to protect it’s vast land mass from aggressors. Everyone knew that the large missile stockpile was more of a threat than a safety net. It seems that China may be trying to play the same card...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Real Cyberwar: A Taxonomy

January 18, 2012 Added by:Infosec Island Admin

Cyberwar should only be leveled as a term when the actual use of warfare if involved. Cyberwar, as yet, has NOT happened. There have been Cyber Operations if you want to use the term but most of what we have been seeing in the news cycle is once again, NOT cyberwar...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Defense Secretary Panetta: Cyber Attack Could Paralyze US

January 06, 2012 Added by:Headlines

"I think we have to be prepared not only to defend against that kind of attack but if necessary we are going to have to be prepared to be able to be aggressive when it comes to cyber efforts as well. We've got to develop the technology, the capability, we've got to be able to defend this country..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Invests Heavily in Developing Cyberwarfare Capabilities

December 19, 2011 Added by:Headlines

The Jerusalem Post reports Iran has recently decided to invest somewhere near one billion dollars to increase both cyber defensive and offensive capabilities. The news comes on the heels of reports that Iran may now be in possession of several advanced U.S. military reconnaissance drones...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army Officially Activates First Dedicated Cyber Brigade

December 14, 2011 Added by:Headlines

"This [activation] is a tribute to the belief in the notion that our nation requires assured freedom of maneuver in cyberspace in this era of persistent conflict and the advent of the increasingly more sophisticated threats to our security," said Maj. Gen. Mary A. Legere...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare Part III - Still More Questions from .GOV

December 13, 2011 Added by:Don Eijndhoven

As for cyber warfare, there are various internationally accepted legal frameworks and that can provide some help. Consider the Law of Armed Conflict or Universal Human Rights, both of which have received wide adoption and have led to increased cooperation among nation states...

Comments  (0)

Aadb52f9100e0d31264fb3ce9e3d2536

The Control Systems Community and Cyber Warfare

December 11, 2011 Added by:Robert M. Lee

Cyber warfare took place long before the release of Stuxnet, but its release caused the world to realize the benefits of using a domain of warfare with limited entry costs and the possibility of non-attribution, which is the ability to operate without positively being connected to an operation...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare – More Questions from .GOV

November 29, 2011 Added by:Don Eijndhoven

The problem of Attribution: Not knowing who will attack, is attacking or has attacked you complicates the situation considerably. It makes all action and reaction susceptible to a fair margin of error and so any response should be carefully considered before execution...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

NATO Drafting Cyber Warfare International Law Manual

November 15, 2011 Added by:Headlines

"The manual is meant to address all the legal issues under a framework of both international use-of-force law and international humanitarian law... it examines related problems such as sovereignty, state responsibility and neutrality... [and] especially those regarding retaliation..."

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare - Questions from .GOV

November 08, 2011 Added by:Don Eijndhoven

People ask what the impact may be from cyber warfare, and this is a valid question. However, it should not be confused with political and/or military motive. War is, as Clausewitz said, the continuation of policy through other means, and that is what cyber is, another means...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Drone Wars – When Cyber Warfare Becomes Real

November 08, 2011 Added by:Dan Dieterle

Much hype has been heard in the media about cyber war but most of the instances cited so far point more to espionage or even at the most extreme case, sabotage. The comparison to “war” really hasn’t been justified. But what if a drone based virus could change friend to a foe?

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

US Chose Not to Use Cyberwarfare Against Libya

November 03, 2011 Added by:Dan Dieterle

Granted you would be coming in through a firewall to attack a computer, but is it really any different than attacking it through radar waves? Especially if the results would be the same, or very similar? If this is true, then is cyber warfare really any different from Electronic Warfare?

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »