Query Result Set
Skip Navigation Links
   ActiveUsers:1565Hits:18378918Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER ATTACKS (39) answer(s).
 
12Next
SrlItem
1
ID:   187626


Behind the veil / Savage, Olivia   Journal Article
Savage, Olivia Journal Article
0 Rating(s) & 0 Review(s)
Key Words Information Warfare  Russia  Ukraine  Cyber Warfare  Cyber Attacks 
        Export Export
2
ID:   152428


Challenges to national security in India / Arunkumar, C; Sakthivel, P   Journal Article
Arunkumar, C Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract There are numerous challenges to the national security of India and the extent and scope of threats are complex, varied and vast. C Arunkumar and P Sakthivel argue that if appropriate actions are not taken, the threats may result in the gradual degradation of the Indian state. They suggest a new set of policies and mechanisms in diverse arenas.
        Export Export
3
ID:   110920


Chinese computer games: keeping safe in cyberspace / Segal, Adam   Journal Article
Segal, Adam Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers. Just five months later, the antivirus software company McAfee issued a report claiming that a group of hackers had broken into the networks of 71 governments, companies, and international organizations. These attacks and the many others like them have robbed companies and governments of priceless intellectual property and crucial military secrets. And although officials have until recently been reluctant to name the culprit, most experts agree that the majority of the attacks originated in China.
        Export Export
4
ID:   110926


Clear and present safety: the United States is more secure than Washington thinks / Zenko, Micah; Cohen, Michael A   Journal Article
Cohen, Michael A Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract Last August, the Republican presidential contender Mitt Romney performed what has become a quadrennial rite of passage in American presidential politics: he delivered a speech to the annual convention of the Veterans of Foreign Wars. His message was rooted in another grand American tradition: hyping foreign threats to the United States. It is "wishful thinking," Romney declared, "that the world is becoming a safer place. The opposite is true. Consider simply the jihadists, a near-nuclear Iran, a turbulent Middle East, an unstable Pakistan, a delusional North Korea, an assertive Russia, and an emerging global power called China. No, the world is not becoming safer."
        Export Export
5
ID:   150179


Consequences of cyber attacks / Ilves, Hendrik Toomas   Journal Article
Ilves, Hendrik Toomas Journal Article
0 Rating(s) & 0 Review(s)
Key Words Interview  Cyber Attacks  Toomas Hendrik Ilves 
        Export Export
6
ID:   117559


Countering terrorism / Katoch, P C   Journal Article
Katoch, P C Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
7
ID:   138793


Cyber attacks in La-La land / Inkster, Nigel   Article
Inkster, Nigel Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Hollywood has not been slow to appreciate and exploit the cinematic potential of the threat from cyber attacks. Films such as Live Free or Die Hard contain graphic depictions of the chaos caused when hackers take control of US transportation networks, the stock market and natural-gas and power grids on the Eastern Seaboard. Hollywood did not, however, anticipate that it would become the target of the first-ever alleged state-sponsored destructive computer-network attack to take place on US soil – and that by virtue of this fact it would find itself, not for the first time, playing the role of a major national-security actor.
        Export Export
8
ID:   141028


Cyber attacks on satellites: a paradigm shift in ASAT application / Patil, P A   Article
Patil, P A Article
0 Rating(s) & 0 Review(s)
        Export Export
9
ID:   138792


Cyber house rules: on war, retaliation and escalation / Cavaiola, Lawrence J; Gompert, David C ; Libicki, Martin   Article
Gompert, David C Article
0 Rating(s) & 0 Review(s)
Summary/Abstract When it comes to cyber war, the United States is ambivalent. While persuaded of the utility of offensive cyber operations, it dreads where they might lead. The advantages of cyber war are swamped by the disadvantages if it cannot be kept under control – and there are nagging doubts about whether it can. That computer systems are often interconnected and ultipurpose, and that there are no sharp ‘firebreaks’ in cyber war, compounds the dangers of escalation to unintended levels and effects, including the disruption of critical civilian services. In a crisis or war, the United States might, despite misgivings, feel compelled to attack computer systems that enable the enemy to strike US forces, only to find itself engaged in cycles of attack and retaliation that produce more pain than gain.
        Export Export
10
ID:   113383


Cyber offence and defence as mutually exclusive national policy / Weeden, Brian   Journal Article
Weeden, Brian Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
11
ID:   128921


Cyber security: the strategic challenge and New Zealand's response / Burton, Joe   Journal Article
Burton, Joe Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
12
ID:   109027


Cyber threat and military challenges / Ghosh, Abhimanyu   Journal Article
Ghosh, Abhimanyu Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
13
ID:   132463


Cyber Warfare and Sino-American crisis instability / Gompert, David C; Libicki, Martin   Journal Article
Gompert, David C Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract China and the US both recognise that an armed conflict between them would include cyber warfare. But there is a curious and risky failure to connect the tactical military advantages of cyber attacks with the strategic hazards.
        Export Export
14
ID:   130650


Cyber warfare and the laws of war / Jha, U C   Journal Article
Jha, U C Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
15
ID:   122912


Cyber-threats to critical national infrastructure: an intelligence challenge / Rudner, Martin   Journal Article
Rudner, Martin Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract Cyber attacks directed at Critical National Infrastructure constitute a significant, diverse, and rapidly escalating risk-element in the global threat environment. Critical infrastructures are susceptible to cyber attacks precisely because of their high inherent value and intrinsic vulnerabilities, coupled with a significant potential to inflict widespread harm on targeted countries. Threats to the cyber-security of critical infrastructures emanate from a wide spectrum of prospective perpetrators: state-sponsored espionage and sabotage, international terrorism, domestic militants, malevolent "hacktivists," or even disaffected insiders. Thus, British intelligence sources indicate that the United Kingdom is being bombarded by thousands of cyber attacks daily, perpetrated by hackers and state-sponsored organizations targeting government and business so as to steal secrets or disable networked computerized systems. 1 While criminal elements can also pose a threat to cyber-security, they tend to be motivated by material or financial benefit, whereas the focus here is exclusively on cyber-attacks perpetrated on Critical National Infrastructures to promote political or ideological objectives.
        Export Export
16
ID:   127364


Dealing with cyber-warfare in future conflicts / Lea, Sebastian   Journal Article
Lea, Sebastian Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
17
ID:   122623


Desi treatment: the government opts for indigenous security solutions for cyber attacks instead of foreign ones / Mekala, Dilip Kumar   Journal Article
Mekala, Dilip Kumar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Key Words European Union  Cyber Security  India  NSA  Cyber Attacks  Indigenous Security Solutions 
NSCS 
        Export Export
18
ID:   160593


Germany as a showcase of U.S. methods of information pressure / Leonov, Ye   Journal Article
Leonov, Ye Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract HYBRID and information warfare, public diplomacy and soft power have a special role to play today. They form an extensive arsenal of means of pressure and influence that do not involve use of force but have proven to be much more effective than traditional military methods.
        Export Export
19
ID:   117751


Global, regional and domestic dynamics in cyber security with s / Samuel, Cherian   Journal Article
Samuel, Cherian Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
20
ID:   148925


Hidden face of jihadist internet forum management: the case of Ansar Al Mujahideen / Torres-Soriano, Manuel R   Journal Article
Torres-Soriano, Manuel R Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of the non-visible part of the forum contributes to a more robust underpinning of some current assumptions regarding the jihadist Internet infrastructure and its hierarchical dependence on, and subordination to, formal terrorist organisations and charismatic leaders. In addition, it offers a new perspective on other aspects such as the many conflicts and rivalries between the different forums, the operational constraints caused by the lack of human and material resources, and the considerable vulnerability of the forums to cyber-sabotage and infiltration attempts.
Key Words Internet  Al Qaeda  Propaganda  Radicalisation  Cyber Attacks 
        Export Export
12Next