Query Result Set
Skip Navigation Links
   ActiveUsers:1534Hits:18296638Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER WAR (66) answer(s).
 
1234Next
SrlItem
1
ID:   186761


America’s cyber-reckoning: how to fix a failing strategy / Gordon, Sue; Rosenbach, Eric   Journal Article
Gordon, Sue Journal Article
0 Rating(s) & 0 Review(s)
Key Words Democracy  United States  America  Cyber War  Cyber Conflict  Cybersecurity 
Cyber Peace 
        Export Export
2
ID:   159189


Another manifestation of cyber conflict: attaining military objectives through cyber avenues of approach / Fasana, Kenton G   Journal Article
Fasana, Kenton G Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.
Key Words Cyber War  Clausewitz  Sun Tzu  Military Theory  Cyber Conflict 
        Export Export
3
ID:   124684


Back to basics: morale of the soldiers must be raised and for that a few corrective steps are needed / Sawhney, Pravin; Wahab, Ghazala   Journal Article
Sawhney, Pravin Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract When chief of army staff (COAS), General Bikram Singh took over as the head of the 13 lakh strong army on 31 May 2012, he was conscious of the extraordinary circumstances that had preceded his elevation. His predecessor, in his public fight with the government over his age row, had wittingly or unwittingly harmed the army grievously. The manpower, which is the real asset of any professional army, had been compelled to take sides: for or against the army chief, General V.K. Singh. Was their chief working for the army or simply for himself, was the question being discussed, in hushed voices, at all levels, from senior officers' enclaves, to formation and unit messes, junior commissioned officers (JCO) messes, and soldiers' langars. When the senior-most officer becomes suspect, the other officers could no longer remain above board.
        Export Export
4
ID:   098732


China's electronic and cyber warfare capabilities / Poduval, Sanjay   Journal Article
Poduval, Sanjay Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Key Words Electronic warfare  China  Cyber crime  Cyber Warfare  Cyber War 
        Export Export
5
ID:   130810


Conflicts and aerospace power in 21st century / Raha, Arup   Journal Article
Raha, Arup Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
6
ID:   160360


Considerations on the Cyber Domain as the New Worldwide Battlefield / Siroli, Gian Piero   Journal Article
Siroli, Gian Piero Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The convergence of telecommunication and computer technologies that has evolved in the field of information and communication technologies (ICT) in the last two decades has had very important effects on new war technologies and the ongoing process of battlefield digitisation. The Stuxnet worm, uncovered in 2010 and responsible for the sabotaging of a uranium enrichment infrastructure in Iran, is a clear example of a digital weapon. The incident shows what is meant by cyber war and what the particular features of this new warfare dimension are compared to the conventional domains of land, sea, air and space, with relevance both at the operational and strategic levels. But cyberspace also extends to the semantic level, within the complimentary field of information warfare involving the content of messages flowing through the Internet for the purposes of propaganda, information, disinformation, consensus building, etc. The overall cyber warfare domain needs to be put into perspective internationally as many countries are developing strong cyber capabilities and an ‘arms race’ is already taking place, showing that these technologies can potentially be used to undermine international stability and security. What is needed is a public debate on the topic and its impact on global stability, and some kind of regulation or international agreement on this new warfare domain, including an approach involving confidence building measures (CBMs).
        Export Export
7
ID:   157466


Cyber arms race: the US and NATO playing catch-up / Antal, John   Journal Article
Antal, John Journal Article
0 Rating(s) & 0 Review(s)
Key Words NATO  Information Warfare  United States  Russia  Cyber War 
        Export Export
8
ID:   138792


Cyber house rules: on war, retaliation and escalation / Cavaiola, Lawrence J; Gompert, David C ; Libicki, Martin   Article
Gompert, David C Article
0 Rating(s) & 0 Review(s)
Summary/Abstract When it comes to cyber war, the United States is ambivalent. While persuaded of the utility of offensive cyber operations, it dreads where they might lead. The advantages of cyber war are swamped by the disadvantages if it cannot be kept under control – and there are nagging doubts about whether it can. That computer systems are often interconnected and ultipurpose, and that there are no sharp ‘firebreaks’ in cyber war, compounds the dangers of escalation to unintended levels and effects, including the disruption of critical civilian services. In a crisis or war, the United States might, despite misgivings, feel compelled to attack computer systems that enable the enemy to strike US forces, only to find itself engaged in cycles of attack and retaliation that produce more pain than gain.
        Export Export
9
ID:   113382


Cyber operations and jus in bello / Melzer, Nils   Journal Article
Melzer, Nils Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
10
ID:   131942


Cyber security: industry steps up to the plate / Gething, Michael J   Journal Article
Gething, Michael J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
11
ID:   132478


Cyber space: implications for national security / Tiwary, A. K   Journal Article
Tiwary, A. K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Nothing remains, neither the state nor wealth nor valour without the security provided by the armed forces. -- S H Ukraniti Cyber space and the possibility of Cyber war, as it emerged in the late 1980s got mixed up with Information War (IW)/ Electronic War (EW). This led to numerous definitions of lW/EW/cyber war, and most definitions, instead of clarifying the issue, only created further confusion. For the purpose of this paper, the latest definition of cyber space, promulgated in the USA in 2010 being the most comprehensive, has been adopted. It defines cyber space as, "A global domain within the information environment consisting of the inter-dependent network of information technology infrastructure and resident data, including the Internet, tele-communication networks, computer systems and embedded processors and controllers." This indicates that there is a physical domain of hardware, and an information domain of software. How we deal with the information or data resident in this domain to deceive the enemy/cyber criminal becomes part of the third domain-
        Export Export
12
ID:   166918


Cyber War: the next threat to national security and what to do about it / Clarke, Richard A; Knake, Robert K 2010  Book
Clarke, Richard A Book
0 Rating(s) & 0 Review(s)
Publication New York, Harper Collins Publishers, 2010.
Description xiv, 306p.hbk
Standard Number 9780061962240
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
056019355.343/CLA 056019MainOn ShelfGeneral 
13
ID:   112577


Cyber War: next threat to national security and what to do about it / Clarke, Richard A; Knake, Robert K 2010  Book
Clarke, Richard A Book
0 Rating(s) & 0 Review(s)
Publication New York, Harper Collins Publishers, 2010.
Description xiv, 290p.Hbk
Standard Number 9780061962233
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
056530355.343/CLA 056530MainOn ShelfGeneral 
14
ID:   129819


Cyber War: next threat to national security and what to do about it / Clarke, Richard A; Knake, Robert K 2010  Book
Clarke, Richard A Book
0 Rating(s) & 0 Review(s)
Publication New York, Harper Collins Publishers, 2010.
Description xiv, 306p.Pbk
Standard Number 9780061962240
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
057703355.343/CLA 057703MainOn ShelfGeneral 
15
ID:   105609


Cyber war: issues in attack and defence / Miller, Robert A; Kuehl, Daniel T; Lachow, Irving   Journal Article
Lachow, Irving Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words National Security  Cyber War  Cyber Attack  Cyber Defence 
        Export Export
16
ID:   133995


Cyber war and deterrence stability: post-START nuclear arms control / Cimbala, Stephen J   Journal Article
Cimbala, Stephen J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Nuclear deterrence and cyber war are often discussed as separate worlds of research and military-strategic practice. To the contrary, a certain degree of overlap between nuclear deterrence and cyber conflicts is a plausible expectation for several reasons. First, future deterrent challenges will include regional nuclear arms races accompanied by competition in information technology and other aspects of advanced conventional command-control and precision strike systems. Second, cyber-attacks may be used against opposed nuclear command-control systems and weapons platforms as well as against infrastructure for the purpose of mass disruption during a crisis or war. Third, cyber capabilities support escalation dominance or escalation control, depending on the objectives of states and on the transparency of identification for cyber friends and foes.
        Export Export
17
ID:   167296


Cyber War and Nuclear Peace / Gompert, David C; Libicki, Martin   Journal Article
Gompert, David C Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The United States must take the lead in reconfiguring nuclear deterrence to withstand cyber war.
Key Words United States  Cyber War  Nuclear Peace 
        Export Export
18
ID:   120288


Cyber war is inevitable (Unless We Build Security In) / McGraw, Gary   Journal Article
McGraw, Gary Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.
        Export Export
19
ID:   111149


Cyber war will not take place / Rid, Thomas   Journal Article
Rid, Thomas Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in three steps that cyber war has never happened in the past, that cyber war does not take place in the present, and that it is unlikely that cyber war will occur in the future. It first outlines what would constitute cyber war: a potentially lethal, instrumental, and political act of force conducted through malicious code. The second part shows what cyber war is not, case-by-case. Not one single cyber offense on record constitutes an act of war on its own. The final part offers a more nuanced terminology to come to terms with cyber attacks. All politically motivated cyber attacks are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion.
Key Words Espionage  Cyber Security  Information Operations  Subversion  Cyber War  Sabotage 
Stuxnet 
        Export Export
20
ID:   132291


Cyber war will not take place / Rid, Thomas 2013  Book
Rid, Thomas Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Pentagon Press, 2013.
Description xvi, 218p.Hbk
Standard Number 9788182747562
Key Words Violence  Security  Cyberspace  Cyber War  Cyber Weapons  Sabotage 
Cyber Espionage  Hacks and Attacks  Cyber Secuity 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
057804355.343/RID 057804MainOn ShelfGeneral 
1234Next