Suchergebnisse
Filter
11 Ergebnisse
Sortierung:
The Newest Security Threat: Cyber-Conflict
In: Local Planning for Terror and Disaster, S. 227-238
Cyberspace, the New Frontier — and the Same Old Multilateralism
In: Global Norms, American Sponsorship and the Emerging Patterns of World Politics, S. 147-177
The cyber threat and globalization: the impact on U.S. national and international security
"Designed for those who want a better grasp of the nature and existential threat of today's information wars. It uses a conceptual approach to explain the relevant concepts as well as the structural challenges and responsibilities with which policy makers struggle and practitioners must work"--
Conflict and cooperation in cyberspace: the challenge to national security
This book brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world.
The Prospects for Cyber Deterrence: American Sponsorship of Global Norms
In: Conflict and Cooperation in Cyberspace, S. 49-78
Challenges in Monitoring Cyberarms Compliance
In: Conflict and Cooperation in Cyberspace, S. 81-100
Challenges in Monitoring Cyberarms Compliance
In: International journal of cyber warfare and terrorism: IJCWT ; an official publication of the Information Resources Management Association, Band 1, Heft 2, S. 35-48
ISSN: 1947-3443
A cyberweapon can be as dangerous as any weapon. Fortunately, recent technology now provides some tools for cyberweapons control. Digital forensics can be done on computers seized during or after hostilities. Cyberweapons differ significantly from other software, especially during development, and recent advances in summarizing the contents of storage media can locate possible cyberweapons quickly. Use of cyberweapons can be distinguished in the usual malicious Internet traffic by being aimed at targets associated with political, social, and cultural issues that are often known in advance, and those targets can then be monitored. Cyberweapons are relatively unreliable compared to other kinds of weapons because they are susceptible to flaws in software; therefore, cyberweapons require considerable testing, preferably against live targets. Thus, international "cyberarms agreements" could provide for forensics on cyberweapons and usage monitoring. Agreements also encourage more responsible cyberweapons use by stipulating attribution and reversibility. The authors discuss the kinds of international agreements that are desirable, and examine the recent interest of the U.S. government in such agreements.