Items Tagged with "Cyber Warfare"
February 20, 2012 Added by:Pierluigi Paganini
Iran will be banned from the purchase of antivirus systems, a technological embargo with clear implications for the Stuxnet virus attacks and the need to prevent further infections to control systems for critical infrastructures, namely their nuclear programs...
February 09, 2012 Added by:Don Eijndhoven
In May of last year, the US Government published its International Strategy for Cyberspace. The publication made some waves in the international community because in this document the US stated that military reprisals to cyber attacks were now officially on the table...
February 07, 2012 Added by:Pierluigi Paganini
Cyberspace is comparable to a stormy sea in which you navigate by sight, and where the scenarios are changing rapidly in an unpredictable way by the presence of uncontrolled entities such as cyber hacktivists, in addition to cyber armies set up by the main world powers...
Cyber criminals, nation-states, hacktivists and other adversaries have different approaches to circumventing cyber defenses. They execute sometimes sophisticated, sometimes simple-minded attacks designed to use and exploit threat vectors as required to accomplish the task...
January 29, 2012 Added by:Rafal Los
You just can't avoid it, so I had to write it. The escalation of rhetoric has gone past media hype and has spilled over into mainstream politics, and now onto the lips of people who should really know better than to perpetuate some of this madness...
January 24, 2012
"Space and cyberspace operations likely will commence well in advance of other operations. In fact, even in the absence of open conflict, operations to gain and maintain cyberspace superiority and space control will be continuous requirements..."
The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?
January 23, 2012 Added by:Pierluigi Paganini
China is a cyber power capable of destroying most any opponent, especially when going against companies in trouble because of the difficult economy situation. These companies are the most vulnerable members of the security chain and therefore a favorite target...
January 19, 2012 Added by:Dan Dieterle
Growing up I heard numerous times that the Soviet's needed so many missiles to protect it’s vast land mass from aggressors. Everyone knew that the large missile stockpile was more of a threat than a safety net. It seems that China may be trying to play the same card...
January 18, 2012
Case studies of particular quality may be considered for publication in future CCSA journals, an upcoming Comprehensive History of Cyber Conflict, or selected for presentation at a future cyber conflict history conference...
January 18, 2012 Added by:Infosec Island Admin
Cyberwar should only be leveled as a term when the actual use of warfare if involved. Cyberwar, as yet, has NOT happened. There have been Cyber Operations if you want to use the term but most of what we have been seeing in the news cycle is once again, NOT cyberwar...
January 06, 2012 Added by:Headlines
"I think we have to be prepared not only to defend against that kind of attack but if necessary we are going to have to be prepared to be able to be aggressive when it comes to cyber efforts as well. We've got to develop the technology, the capability, we've got to be able to defend this country..."
December 19, 2011 Added by:Headlines
The Jerusalem Post reports Iran has recently decided to invest somewhere near one billion dollars to increase both cyber defensive and offensive capabilities. The news comes on the heels of reports that Iran may now be in possession of several advanced U.S. military reconnaissance drones...
December 14, 2011 Added by:Headlines
"This [activation] is a tribute to the belief in the notion that our nation requires assured freedom of maneuver in cyberspace in this era of persistent conflict and the advent of the increasingly more sophisticated threats to our security," said Maj. Gen. Mary A. Legere...
December 13, 2011 Added by:Don Eijndhoven
As for cyber warfare, there are various internationally accepted legal frameworks and that can provide some help. Consider the Law of Armed Conflict or Universal Human Rights, both of which have received wide adoption and have led to increased cooperation among nation states...
December 11, 2011 Added by:Robert M. Lee
Cyber warfare took place long before the release of Stuxnet, but its release caused the world to realize the benefits of using a domain of warfare with limited entry costs and the possibility of non-attribution, which is the ability to operate without positively being connected to an operation...