Query Result Set
Skip Navigation Links
   ActiveUsers:1063Hits:18658531Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CYBER-ATTACK (3) answer(s).
 
SrlItem
1
ID:   145859


Cyber conceptual framework for developing military doctrine / Ormrod, David; Turnbull, Benjamin   Journal Article
Ormrod, David Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion.
        Export Export
2
ID:   165133


Damoclean sword of offensive cyber: policy uncertainty and collective insecurity / Leuprecht, Christian; Szeman, Joseph   Journal Article
Leuprecht, Christian Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.
        Export Export
3
ID:   171058


Evaluating commercial cyber intelligence activity / Work, JD   Journal Article
Work, JD Journal Article
0 Rating(s) & 0 Review(s)
        Export Export