Item Details
Skip Navigation Links
   ActiveUsers:1473Hits:19829501Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Article   Article
 

ID135525
Title ProperMapping the cyber dragon
Other Title Information China’s conduct of terror in the cyber world
LanguageENG
AuthorDilipraj, E
Summary / Abstract (Note)Cyber- widely considered as the fifth domain of warfare- is a conflict ridden domain where actual war is rare case scenario but other forms of conflict are an everyday affair between the challenging players. Now, the question that arises is: what are the other forms of conflict in the cyber domain? The answer to this question in simple words is: since the cyber domain involves players ranging from individuals to nation-states, the various form of conflict in it range from cyber theft, hacking, cyber espionage, data collection through excitation, to cyber sabotage, cyber terrorism, cyber propaganda, cyber warfare etc.
`In' analytical NoteDefence and Diplomacy Vol.3, No.4; Jul-Sep.2014: p.85-97
Journal SourceDefence and Diplomacy 2014-09 3, 4
Key WordsWarfare ;  Cyber Security ;  China ;  Internet ;  Cyber ;  Cyber Terroris ;  Cyber Environment of China