Items Tagged with "Cyber Warfare"


44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare – More Questions from .GOV

November 29, 2011 Added by:Don Eijndhoven

The problem of Attribution: Not knowing who will attack, is attacking or has attacked you complicates the situation considerably. It makes all action and reaction susceptible to a fair margin of error and so any response should be carefully considered before execution...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

NATO Drafting Cyber Warfare International Law Manual

November 15, 2011 Added by:Headlines

"The manual is meant to address all the legal issues under a framework of both international use-of-force law and international humanitarian law... it examines related problems such as sovereignty, state responsibility and neutrality... [and] especially those regarding retaliation..."

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare - Questions from .GOV

November 08, 2011 Added by:Don Eijndhoven

People ask what the impact may be from cyber warfare, and this is a valid question. However, it should not be confused with political and/or military motive. War is, as Clausewitz said, the continuation of policy through other means, and that is what cyber is, another means...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Drone Wars – When Cyber Warfare Becomes Real

November 08, 2011 Added by:Dan Dieterle

Much hype has been heard in the media about cyber war but most of the instances cited so far point more to espionage or even at the most extreme case, sabotage. The comparison to “war” really hasn’t been justified. But what if a drone based virus could change friend to a foe?

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

US Chose Not to Use Cyberwarfare Against Libya

November 03, 2011 Added by:Dan Dieterle

Granted you would be coming in through a firewall to attack a computer, but is it really any different than attacking it through radar waves? Especially if the results would be the same, or very similar? If this is true, then is cyber warfare really any different from Electronic Warfare?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Stuxnet, SCADA, Nation State Terrorism and FUD

October 13, 2011 Added by:Infosec Island Admin

With the advent of the “smart” grid, this might in fact make it easier to have a larger percentage of failure within the system itself. Everything being tied together this way and monitored will only serve to make the system more susceptible to a single point of failure...

Comments  (2)

E11e506024f5d2b70f037b9af4734f33

Israel and Cyber Warfare

September 27, 2011 Added by:Stefano Mele

The book discusses the formulation and development of Israeli deterrence policies, including the ability to carry out injurious and direct response against any party engaged in aggression against Israeli cyberspace...

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

Future Enterprise: Cyber Warfare

September 23, 2011 Added by:Bill Gerneglia

Cyber war is now an urgent issue that transcends lines between enterprises or governments. Unless a global cyber security framework can be engineered, a world of disorder will rapidly emerge - a turbulent world, where change has ceased to be beneficial and becomes ultimately destructive...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Linking Cyberspace and 4th Generation Warfare - Act Deux

September 09, 2011 Added by:Don Eijndhoven

It is easily conceivable that online collectives such as Anonymous and LulzSec, who are known to harbor militant types, will eventually get bored with relatively innocuous attacks and start targeting digital weak points to critical infrastructure to bring their point across...

Comments  (5)

850c7a8a30fa40cf01a9db756b49155a

RSA Attack: All That Glitters Isn't China

September 07, 2011 Added by:J. Oquendo

RSA Attack: So we have a company that digs up a name, associates that name with a quick Google search to an IP in China and labels it a threat, then they compile a half-checked dynamic malware analysis and call it a day. Those are the facts according to FireEye and others, here are mine...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

UK Investing Heavily in Cyber Offensive Capabilities

September 07, 2011 Added by:Headlines

"Suppose you're a scientist at Cheltenham and you come up with a new exploit of Windows. Are you going to tell Microsoft, get it patched and protect 60 million Brits? Or are you going to keep quiet about it so you can exploit 1.2 billion Chinese and 1 billion Indians?"

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The Cyberworld Points at China

September 01, 2011 Added by:Joel Harding

While the rest of the world is seeking to define and quantify cyberwar, cyber espionage, cyber theft - and only then, finding ways to stop it - I believe the Chinese are nimbly spanking our butts in cyberspace – and we don’t have the guts to stop them...

Comments  (5)

94ae16c30d35ee7345f3235dfb11113c

Did China Really Expose a Cyber Attack Tool?

August 30, 2011 Added by:Joel Harding

Wow, it’s really cool that we have proof that China not only has the capabilities but has been caught red-handed attacking a website, and the target they’re attacking is located inside the US. I’m sure somebody at the new US Cyber Command jumped up and down and said, “Yes! We have proof..."

Comments  (5)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Monkey See Monkey Do

August 29, 2011 Added by:J. Oquendo

Arguments surrounding APT will remain a battle of expert vs. expert - but how about we use some common sense for a moment? If YOU were an attacker, why would you bother attacking from your own fixed location? It would make more sense to attack from another country for deflection purposes...

Comments  (6)

7fef78c47060974e0b8392e305f0daf0

From China with Love: The Chairman Meow Collection

August 26, 2011 Added by:Infosec Island Admin

China has been working us over for a long time, and with each day’s passing we have been steadily more compromised by the 7th directorate and their proxy hacking groups. This is not to say that others aren’t doing the same thing as well, China just happens to be the more active...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Cyberspace and 4th Generation Warfare - A Marriage of Convenience

August 25, 2011 Added by:Don Eijndhoven

The lesson here is that we should prepare our online critical infrastructure for attacks ahead of time. Assume that attacks will come and that attacks will be successful. This means that critical services should be redundant and capable of providing service even while under attack...

Comments  (10)

Page « < 2 - 3 - 4 - 5 - 6 > »