Query Result Set
Skip Navigation Links
   ActiveUsers:995Hits:18676682Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBERATTACKS (17) answer(s).
 
SrlItem
1
ID:   173775


At home and abroad: the use of denial-of-service attacks during elections in nondemocratic regimes / Lutscher, Philipp M (et.al)   Journal Article
Lutscher, Philipp M (et.al) Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In this article, we study the political use of denial-of-service (DoS) attacks, a particular form of cyberattack that disables web services by flooding them with high levels of data traffic. We argue that websites in nondemocratic regimes should be especially prone to this type of attack, particularly around political focal points such as elections. This is due to two mechanisms: governments employ DoS attacks to censor regime-threatening information, while at the same time, activists use DoS attacks as a tool to publicly undermine the government’s authority. We analyze these mechanisms by relying on measurements of DoS attacks based on large-scale Internet traffic data. Our results show that in authoritarian countries, elections indeed increase the number of DoS attacks. However, these attacks do not seem to be directed primarily against the country itself but rather against other states that serve as hosts for news websites from this country.
        Export Export
2
ID:   186764


Case for cyber-realism: geopolitical problems don’t have technical solutions / Alperovitch, Dmitri   Journal Article
Alperovitch, Dmitri Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
3
ID:   123051


China’s real and present danger: now is the time for Washington to worry / Goldstein, Avery   Journal Article
Goldstein, Avery Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract Much of the debate about China's rise in recent years has focused on the potential dangers China could pose as an eventual peer competitor to the United States bent on challenging the existing international order. But another issue is far more pressing. For at least the next decade, while China remains relatively weak compared to the United States, there is a real danger that Beijing and Washington will find themselves in a crisis that could quickly escalate to military conflict. Unlike a long-term great-power strategic rivalry that might or might not develop down the road, the danger of a crisis involving the two nuclear-armed countries is a tangible, near-term concern -- and the events of the past few years suggest the risk might be increasing.
        Export Export
4
ID:   131289


Cybersecurity and cyberwar: what everyone needs to know / Singer, P W; Friedman, Allan 2014  Book
Singer, P W Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Oxford University Press, 2014.
Description viii, 306p.Pbk
Standard Number 9780199451654
   Reserve     Export Export
Copies: C:1/I:1,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocationIssuedToDueOn
057761005.8/SIN 057761MainIssuedGeneral RA7312-Apr-2024
5
ID:   146737


Dangers of using cyberattacks to counter nuclear threats / Futter, Andrew   Journal Article
Futter, Andrew Journal Article
0 Rating(s) & 0 Review(s)
Contents Top military and defense officials in the United States are currently contemplating plans to use cyberattack capabilities against enemy missile and command-and-control systems as part of a new push for full-spectrum missle defense.
        Export Export
6
ID:   188292


Distinguishing Cyberattacks by Difficulty / Thomas, M A   Journal Article
Thomas, M A Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Some discussions of cyberattacks paint them broadly as low cost and widely available, failing to distinguish cyberattacks by difficulty. However, as the literature has long recognized, cyberattacks are not all alike. The most sophisticated attacks require greater capabilities, including noncyber capabilities, that are commanded by only by a handful of states. Assessment of the difficulty of cyberattacks therefore requires a broader view of a cyberattack than a view focused on gaining and maintaining unauthorized access to a computer. The proposed Cyber Effects model of a cyberattack looks to the ultimate effect sought by the attacker, which may be focused only on gaining access to a device or may seek access to produce a cascade of external effects. This model can then be used as a conceptual model to organize factors that bear on attack difficulty for assessment.
Key Words Cyberattacks 
        Export Export
7
ID:   149503


Live free or die hard: U.S.–UK cybersecurity policies / Stoddart, Kristan   Journal Article
Stoddart, Kristan Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract KRISTAN STODDART describes the cybersecurity policies of the United States and the United Kingdom. He argues that both countries should address cyberattacks to critical national infrastructure by adopting internationally-oriented policies that include the private sector and civil society.
        Export Export
8
ID:   102410


Mobilising cyber power / Klimburg, Alexander   Journal Article
Klimburg, Alexander Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract Cyber crime, cyber terrorism and cyber warfare share a common technological basis, tools, logistics and operational methods. They can also share the same social networks and have comparable goals. The differences between these categories of cyber activity are often razor thin, or only in the eye of the beholder. From the perspective of a cyber warrior, cyber crime can offer the technical basis (software tools and logistic support) and cyber terrorism the social basis (personal networks and motivation)with which to execute attacks on the computer networks of enemy groups or nations.
Key Words CIA  United States  China  Russia  Cyber crime  Cyber Warfare 
Cyber Terrorism  Cyber Power  Cyberattacks 
        Export Export
9
ID:   102863


New virology: the future of war by other means / Hoffman, David E   Journal Article
Hoffman, David E Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words United States  China  Russia  Barack Obama  Swine Flu  Cybersecurity 
Cyberattacks  Computer Security Expert 
        Export Export
10
ID:   107390


Pentagon issues cyber strategy / Farnsworth, Timothy   Journal Article
Farnsworth, Timothy Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract In the wake of a rising number of cyberattacks on computer networks worldwide, the U.S. Department of Defense on July 14 released an unclassified strategy for defending against and responding to attacks on U.S. computer networks and infrastructure.
        Export Export
11
ID:   162659


Politics of attributing blame for cyberattacks and the costs of uncertainty / Schulzke, Marcus   Journal Article
Schulzke, Marcus Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Attribution is one of the most serious challenges associated with cyberattacks. It is often difficult to determine who launched an attack and why, which hinders efforts to formulate appropriate responses. Although the attribution problem has been discussed extensively in research on cybersecurity, it is generally approached as a technical challenge for security professionals and politicians. I contend that it is vital to take the attribution problem beyond this elite focus by considering how attributional challenges can interfere with the public’s efforts to understand security challenges and evaluate government actions. Faced with uncertainty and the confusion of attempting to understand novel cyber threats, citizens frequently lack the information they need to reliably identify the culprits behind attacks—or sometimes even to know whether an attack has taken place. I show that attributional uncertainty immediately following cyberattacks encourages dependence on a narrow range of elite frames and the assignment of blame to familiar enemies. Over time this promotes conspiratorial thinking and poses a risk to democratic accountability. When seen in light of these broader costs, the attribution problem becomes a vital political concern with implications that reach beyond the scope of elite-focused cybersecurity research.
        Export Export
12
ID:   147490


Repression, education, and politically motivated cyberattacks / Asal, Victor; Mauslein, Jacob   Journal Article
Asal, Victor Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract What factors drive politically motivated cyberattacks? Our research focuses on one particular kind of cyberattack: politically motivated, distributed denial-of-service attacks (DDoS). We argue that denial-of-service attacks are a particular form of a larger category of political contention that is more similar to nonviolent than violent activism. We offer a country-level explanation that helps establish why some nation-states are more likely to suffer such attacks while most others are not. When we control for wealth and Internet penetration, the strongest factor explaining why a country is more likely to suffer DDoS attacks is the dangerous combination of repression and a highly educated population. The results have important implications both for the scholarly study of this form of contention, as well as for policymakers grappling with this new form of activism.
Key Words Repression  Cyber  Cyberattacks 
        Export Export
13
ID:   100544


Running the world, after the crash: has the era of global cooperation ended before it began? / Samans, Richard; Schwab, Klaus; Malloch-Brown, Mark   Journal Article
Schwab, Klaus Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
14
ID:   112451


State of deterrence in international politics today / Morgan, Patrick M   Journal Article
Morgan, Patrick M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract In comparison with the Cold War era, deterrence in international politics has changed significantly, even though many of the basic components of that deterrence still exist and continue to have an impact. Deterrence is now less salient in national security policies and international security management, more recessed, particularly nuclear deterrence. This is primarily due to the huge changes in international politics ushered in by the end of the Cold War, particularly in great-power political relationships, and which are continuing to unfold. Important developments are underway with respect to nuclear deterrence, extended deterrence, collective actor deterrence, and other aspects of international system security. While many old topics pertaining to deterrence continue to be studied and generate continuing controversies, often along the same lines as in the past, some important investigations and theoretical analyses have also emerged on pivotal deterrence, the deterrence of cyberattacks, terrorism, and international crime. What is needed most is analysis on how to develop and apply deterrence strategy and practice in new ways as a central contribution to global and regional system security maintenance and management, a function deterrence performed during the Cold War but in ways now largely out of date. Also needed is careful attention to the possibility of the return of more traditional international politics, particularly if this were to occur in relations among the major states, and careful consideration of how best to use deterrence to hedge against such a development.
        Export Export
15
ID:   119010


U.S. officials detail cyber policy / Farnsworth, Timothy   Journal Article
Farnsworth, Timothy Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Key Words United States  China  Russia  Cyberspace  Cyberattacks  Cyber Policy 
        Export Export
16
ID:   115774


U.S., Russia discuss cyber hotline / Farnsworth, Timothy   Journal Article
Farnsworth, Timothy Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
17
ID:   186762


World without trust: the insidious cyberthreat / Schneider, Jacquelyn   Journal Article
Schneider, Jacquelyn Journal Article
0 Rating(s) & 0 Review(s)
Key Words United States  Cybersecurity  Cyberattacks  Cyberthreats 
        Export Export