Query Result Set
Skip Navigation Links
   ActiveUsers:1060Hits:18510667Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER CONFLICTS (6) answer(s).
 
SrlItem
1
ID:   133071


Cyber war, cybered conflict, and the maritime domain / Dombrowski, Peter; Demchak, Chris C   Journal Article
Dombrowski, Peter Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract It has been well over a decade since the first “prophets” of information warfare proclaimed a new age of conflict fought not just on air, sea, and land but with electrons in what came to be known as “cyberspace.”1 Since these early predictions, many incidents have confirmed that criminals, random hackers, and government-sanctioned specialists can wreak havoc on governments, military communications systems, and corporations. The Stuxnet worm alone helped delay-by months, perhaps years-the long-standing efforts of Iran to acquire sufficient nuclear material to build nuclear weapons.2 Recent revelations of hacking campaigns against such publications as the Wall Street Journal and New York Times have broadened concerns to include even the integrity of American democratic institutions.3 Meanwhile, the commander of U.S. Cyber Command has characterized cyber attacks designed to gain access to the intellectual property of American corporations as the “greatest transfer of wealth in human history.”
        Export Export
2
ID:   117751


Global, regional and domestic dynamics in cyber security with s / Samuel, Cherian   Journal Article
Samuel, Cherian Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
3
ID:   130882


IP: geolocation a must for cyber-offensive / Saini, Mukesh   Journal Article
Saini, Mukesh Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Cyber warfare is very similar in nature to naval warfare. In international waters, navy encounters enemy warships, large merchant vessels, small merchant ships, fishing boats and guised surveillance ships from all directions. There are no borders to clearly establish that everything on the other side belongs to enemy. Though there are Sea-Lanes-of-Communication (SLOC) but two ports are actually on connectionless service and no ship is bound to follow SLOC. In cyberspace, IP address is the flag which every asset on the Internet displays but ruse is not uncommon. It is therefore necessary to identify the cyber assets positively in any cyber-conflict before any aggressive response is initiated. Wearing flag of convenience is common for sea vessels as well as cyber assets.
        Export Export
4
ID:   124373


Myth of cyber war bringing war in cyberspace back down to earth / Gartzke, Erik   Journal Article
Gartzke, Erik Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract A blitz of media, punditry, and official pronouncements raise the specter of war on the internet. Future conflicts may well take place in cyberspace, where victory or defeat could be determined in mere "nanoseconds."1 Secretary of Defense Leon Panetta has even warned of a "cyber-Pearl Harbor."2 Nor are fears of cyberwar abstract speculation. Events such as the denial of service attacks against Estonian and Georgian government websites, the Stuxnet worm designed to disable Iranian nuclear centrifuges, and the recent hacking of U.S. military computer networks seem to indicate that the era of cyberwar has already arrived.
        Export Export
5
ID:   155030


Prospects for the rule of law in cyberspace / Giles, Keir 2017  Book
Giles, Keir Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Alpha Editions, 2017.
Description xv, 44p.pbk
Standard Number 9789386423993
Key Words Cyberspace  Rule of Law  Cybersecurity  Cyber Conflicts 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059185343.7309944/GIL 059185MainOn ShelfGeneral 
6
ID:   133072


understanding the constraints of contemporary private security / Spearin, Christopher   Journal Article
Spearin, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract For the secretary-general of the United Nations, Ban Ki-moon, contemporary piracy is nothing less than a "global menace." There are several piracy "hot spots" the world over, each with its own dynamics, but it is Somali piracy that in recent years has particularly caught the attention and raised the ire of states, shippers, and international organizations. International Maritime Organization (IMO) statistics reflect the quantitative dominance of Somali piracy. In 2010 and 2011, the number of alleged attacks in international waters off East Africa and on the Indian Ocean (into which Somali pirates now venture) was 84 percent of the global totals in each year. In 2012, owing to developments both on land and at sea, the Somali weighting declined, but it was still a considerable 54 percent of global totals.
        Export Export