Srl | Item |
1 |
ID:
187626
|
|
|
2 |
ID:
152428
|
|
|
Summary/Abstract |
There are numerous challenges to the national security of India and the extent and scope of threats are complex, varied and vast. C Arunkumar and P Sakthivel argue that if appropriate actions are not taken, the threats may result in the gradual degradation of the Indian state. They suggest a new set of policies and mechanisms in diverse arenas.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
110920
|
|
|
Publication |
2012.
|
Summary/Abstract |
In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers. Just five months later, the antivirus software company McAfee issued a report claiming that a group of hackers had broken into the networks of 71 governments, companies, and international organizations. These attacks and the many others like them have robbed companies and governments of priceless intellectual property and crucial military secrets. And although officials have until recently been reluctant to name the culprit, most experts agree that the majority of the attacks originated in China.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
110926
|
|
|
Publication |
2012.
|
Summary/Abstract |
Last August, the Republican presidential contender Mitt Romney performed what has become a quadrennial rite of passage in American presidential politics: he delivered a speech to the annual convention of the Veterans of Foreign Wars. His message was rooted in another grand American tradition: hyping foreign threats to the United States. It is "wishful thinking," Romney declared, "that the world is becoming a safer place. The opposite is true. Consider simply the jihadists, a near-nuclear Iran, a turbulent Middle East, an unstable Pakistan, a delusional North Korea, an assertive Russia, and an emerging global power called China. No, the world is not becoming safer."
|
|
|
|
|
|
|
|
|
|
5 |
ID:
150179
|
|
|
6 |
ID:
117559
|
|
|
7 |
ID:
138793
|
|
|
Summary/Abstract |
Hollywood has not been slow to appreciate and exploit the cinematic potential of the threat from cyber attacks. Films such as Live Free or Die Hard contain graphic depictions of the chaos caused when hackers take control of US transportation networks, the stock market and natural-gas and power grids on the Eastern Seaboard. Hollywood did not, however, anticipate that it would become the target of the first-ever alleged state-sponsored destructive computer-network attack to take place on US soil – and that by virtue of this fact it would find itself, not for the first time, playing the role of a major national-security actor.
|
|
|
|
|
|
|
|
|
|
8 |
ID:
141028
|
|
|
9 |
ID:
138792
|
|
|
Summary/Abstract |
When it comes to cyber war, the United States is ambivalent. While persuaded of the utility of offensive cyber operations, it dreads where they might lead. The advantages of cyber war are swamped by the disadvantages if it cannot be kept under control – and there are nagging doubts about whether it can. That computer systems are often interconnected and ultipurpose,
and that there are no sharp ‘firebreaks’ in cyber war, compounds the dangers of escalation to unintended levels and effects, including the disruption of critical civilian services. In a crisis or war, the United States might, despite misgivings, feel compelled to attack computer systems that enable the enemy to strike US forces, only to find itself engaged in cycles of attack and retaliation that produce more pain than gain.
|
|
|
|
|
|
|
|
|
|
10 |
ID:
113383
|
|
|
11 |
ID:
128921
|
|
|
12 |
ID:
109027
|
|
|
13 |
ID:
132463
|
|
|
Publication |
2014.
|
Summary/Abstract |
China and the US both recognise that an armed conflict between them would include cyber warfare. But there is a curious and risky failure to connect the tactical military advantages of cyber attacks with the strategic hazards.
|
|
|
|
|
|
|
|
|
|
14 |
ID:
130650
|
|
|
15 |
ID:
122912
|
|
|
Publication |
2013.
|
Summary/Abstract |
Cyber attacks directed at Critical National Infrastructure constitute a significant, diverse, and rapidly escalating risk-element in the global threat environment. Critical infrastructures are susceptible to cyber attacks precisely because of their high inherent value and intrinsic vulnerabilities, coupled with a significant potential to inflict widespread harm on targeted countries. Threats to the cyber-security of critical infrastructures emanate from a wide spectrum of prospective perpetrators: state-sponsored espionage and sabotage, international terrorism, domestic militants, malevolent "hacktivists," or even disaffected insiders. Thus, British intelligence sources indicate that the United Kingdom is being bombarded by thousands of cyber attacks daily, perpetrated by hackers and state-sponsored organizations targeting government and business so as to steal secrets or disable networked computerized systems. 1 While criminal elements can also pose a threat to cyber-security, they tend to be motivated by material or financial benefit, whereas the focus here is exclusively on cyber-attacks perpetrated on Critical National Infrastructures to promote political or ideological objectives.
|
|
|
|
|
|
|
|
|
|
16 |
ID:
127364
|
|
|
17 |
ID:
122623
|
|
|
18 |
ID:
160593
|
|
|
Summary/Abstract |
HYBRID and information warfare, public diplomacy and soft power have a special role to play today. They form an extensive arsenal of means of pressure and influence that do not involve use of force but have proven to be much more effective than traditional military methods.
|
|
|
|
|
|
|
|
|
|
19 |
ID:
117751
|
|
|
20 |
ID:
148925
|
|
|
Summary/Abstract |
This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of the non-visible part of the forum contributes to a more robust underpinning of some current assumptions regarding the jihadist Internet infrastructure and its hierarchical dependence on, and subordination to, formal terrorist organisations and charismatic leaders. In addition, it offers a new perspective on other aspects such as the many conflicts and rivalries between the different forums, the operational constraints caused by the lack of human and material resources, and the considerable vulnerability of the forums to cyber-sabotage and infiltration attempts.
|
|
|
|
|
|
|
|
|
|