Query Result Set
Skip Navigation Links
   ActiveUsers:1695Hits:18386885Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER THREATS (17) answer(s).
 
SrlItem
1
ID:   113385


Achieving mutual comprehension: why cyberpower matters to both developed and developing countries / Sheldon, John B   Journal Article
Sheldon, John B Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
2
ID:   130048


Astropolitics and the "exopolitics" of unacknowledged activitie / Salla, Michael E   Journal Article
Salla, Michael E Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The role of unacknowledged classified programs remains an enigma for fully understanding activities in space and the study of astropolitics. Classified programs by law are not publicly announced, and remain inaccessible to all except those with valid security clearances to be briefed about them. In the United States, waived Unacknowledged Special Access Programs are the most highly classified programs conducted by the military and intelligence community. The same classification protocols are also required of private contractors working with U.S. military departments and intelligence agencies on classified programs. As space continues to grow in its national security significance, the number of these unacknowledged programs pertaining to space is likely to grow significantly from its current number. This requires adopting the necessary conceptual tools and methodological flexibility for investigating unacknowledged activities in space. This also extends to evidence concerning unidentified flying objects and extraterrestrial life. This article suggests that "exopolitics" is a unique multidisciplinary approach to extraterrestrial life that offers a helpful set of conceptual tools for studying unacknowledged space activities, and complements the field of astropolitics.
        Export Export
3
ID:   171539


Challenges to prevention of nuclear terrorism / Khanijo, Roshan   Journal Article
Khanijo, Roshan Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
4
ID:   142686


China’s emergence as a cyber power / Sharma, Munish   Article
Sharma, Munish Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.
Key Words China  Cyber Threats  Cyber Power  Informationalisation  Cyber Domain 
        Export Export
5
ID:   115795


China's cyber ability seen as risk to U.S. / Farnsworth, Timothy   Journal Article
Farnsworth, Timothy Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
6
ID:   133611


Comprehensive approach to internet governance and cybersecurity / Gupta, Arvind; Samuel, Cherian   Journal Article
Gupta, Arvind Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The pressing issues around cyberspace revolve around internet governance, cybersecurity and drawing up rules of the road for the new domain of cyberwar. While each of these is at a different stage in its evolution cycle, cyberspace itself is facing a watershed moment as insecurities mount. The fragmentation of cyberspace seems inevitable unless there is accelerated movement on resolving the fundamental issues of internet governance and cybersecurity that have been hanging fire for well over a decade.
        Export Export
7
ID:   130212


Critical infrastructure protection / Donaldson, Peter   Journal Article
Donaldson, Peter Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
8
ID:   019327


Cyber threats to maritime drade and port infrastructure / Ma Wei-Ming April 2001  Article
Ma Wei-Ming Article
0 Rating(s) & 0 Review(s)
Publication April 2001.
Description 77-92
        Export Export
9
ID:   133609


Cyberspace: the new strategic realm in US-China relations / Segal, Adam M   Journal Article
Segal, Adam M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract In June 2013, President Obama met with President Xi Jinping at Sunnylands, California. The meeting was seen as a chance for the two leaders to get to know each other in a relatively informal setting so they could address the growing mistrust between their countries. While maritime disputes, trade tensions and differences over how to contain the North Korean and Iranian nuclear programmes were high on the agenda, cyber security-in particular Chinese cyber espionage-was the defining issue of this unusual summit. For the US, the meeting between the two presidents was the culmination of a long campaign to pressure Beijing to reduce the scope and scale of Chinese cyber attacks on the United States.
        Export Export
10
ID:   133610


Cyberspace: post-Snowden / Bajaj, Kamlesh   Journal Article
Bajaj, Kamlesh Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Just as the world was beginning to understand the various dimensions of cyberspace in general, and internet governance in particular, it received the rude shock of the Snowden revelations about the global surveillance carried out by the United States National Security Agency (NSA) in the name of counterterrorism. All kinds of electronic communications of US citizens and non-citizens alike were monitored. Phone tapping and electronic interception were part of this huge operation to collect a haystack of data in the hope of detecting terrorist links to protect national security. The stories that are emerging from the NSA documents made available by Edward Snowden since June 2013 in the Guardian, the New York Times, Der Spiegel and the Washington Post continue to surprise, enrage or shame people depending upon the nation or group that they belong to. The whole world, including those who work for spy agencies, is surprised at the enormity of the scale of surveillance.
        Export Export
11
ID:   151072


Deterrence and dissuasion in cyberspace / Nye, Joseph S   Journal Article
Nye, Joseph S Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Understanding deterrence and dissuasion in cyberspace is often difficult because our minds are captured by Cold War images of massive retaliation to a nuclear attack by nuclear means. The analogy to nuclear deterrence is misleading, however, because many aspects of cyber behavior are more like other behaviors, such as crime, that states try (imperfectly) to deter. Preventing harm in cyberspace involves four complex mechanisms: threats of punishment, denial, entanglement, and norms. Even when punishment is used, deterrent threats need not be limited to cyber responses, and they may address general behavior as well as specific acts. Cyber threats are plentiful, often ambiguous, and difficult to attribute. Problems of attribution are said to limit deterrence and dissuasion in the cyber domain, but three of the major means—denial by defense, entanglement, and normative taboos—are not strongly hindered by the attribution problem. The effectiveness of different mechanisms depends on context, and the question of whether deterrence works in cyberspace depends on “who and what.” Not all cyberattacks are of equal importance; not all can be deterred; and not all rise to the level of significant national security threats. The lesson for policymakers is to focus on the most important attacks and to understand the context in which such attacks may occur and the full range of mechanisms available to prevent them.
Key Words Deterrence  Nuclear Deterrence  Cyberspace  Cyber Threats  Cold War 
        Export Export
12
ID:   125362


Faceless crime: criminal groups turn to cyber technology / Pritchard, Robert   Journal Article
Pritchard, Robert Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract As awareness of the need for online privacy grows, technology is increasingly becoming available to help internet users maintain anonymity, Robert Pritchard investigates illegal activities facilitated by such technology and the inherent problems in tacking it.
        Export Export
13
ID:   134052


Indo-US cooperation in countering cyber terrorism: challenges and limitations / Singh, Swaran; Krupakar, Jayanna   Journal Article
Singh, Swaran Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The increasing dependence on Information and Communication Technologies (ICTs) has unleashed a whole new genre of cyber terrorism. Cyber attacks on critical infrastructure, online hate propaganda and use of the internet for recruiting, planning and effecting terrorist attacks have become new frontiers of terrorism. The ubiquitous cyberspace has expanded terrorism structures and transformed their operations. Given their democratic traditions of privileging basic freedoms, such as individual privacy, and the unprecedented spread of the internet, India and the US face a formidable challenge in confronting cyber terrorism. While both countries share a strong political affinity to cooperate and have set up institutional mechanisms to secure cyberspace, divergences in their approaches and a lack of clarity and consensus on their immediate and long-term goals continue to be their fundamental limitations. In spite of their strong commitment to work together, their divergent approaches to internet governance and episodes like the WikiLeaks and Snowden affairs have only re-enforced their continuing trust deficit.
        Export Export
14
ID:   133608


National perceptions of cyber threats / Lewis, James A   Journal Article
Lewis, James A Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The issue of cybersecurity as an issue for international security has captured the attention of policy makers around the world. A 2011 United Nations (UN) assessment found that only 68 of the 193 UN member states had cybersecurity programmes. By 2012, this had increased to 114 countries. Of the nations with cybersecurity programmes, roughly 40 have publicly identified cybersecurity as a military concern in national military strategies or defence white papers.
        Export Export
15
ID:   179202


Navigating global challenges / Clark, Laura   Journal Article
Clark, Laura Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The elements in which New Zealand and the United Kingdom find themselves include the prevailing winds, the storms coming at them across the horizon and the threats to their security and way of life. Safely navigating these seas demands the careful determination of priorities over the next ten years, and of how they mean to act on the world stage. Important questions arise as to what that means in terms of tools and capability; relationships; and ability to work together. The United Kingdom is committed to working together with New Zealand, both bilaterally and multilaterally, to tackle global challenges and promote global goods.
        Export Export
16
ID:   189426


Theory of strategic culture: an analytical framework for Russian cyber threat perception / Kari, Martti J   Journal Article
Kari, Martti J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The strategic environment is evolving rapidly with the recognition of cyberspace as a domain of warfare. The increased interest in cyber as a part of defence has heightened the need for theoretical tools suitable to assess cyber threat perceptions and responses to these threats. Drawing from previous research, we will formulate an analytical framework to study the formation of Russian thinking on cyber threats as a part of Russian strategic culture. This article identifies a sense of vulnerability, the narrative of Russia as a besieged fortress and the technological inferiority of Russia as specific factors influencing Russian cyber threat perception.
        Export Export
17
ID:   091892


Total gridlock: cyber threat to critical infrastructure / Gundert, Levi   Journal Article
Gundert, Levi Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Cyber security is becoming an increasingly important issue, as governments and companies evaluate the potential risks that cyber attacks could pose. In May, US President Barack Obama announced a new cyber security strategy to coordinate national cyber security initiatives, warning that the cyber threat is one of the most serious economic and national security challenges facing the United States.
        Export Export