Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013
…
2 pages
1 file
• Provides a multidisciplinary approach to Cyber Warfare analyzing the information technology, military, policy, social, and scientific issues that are in play. • Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran) • Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec • Covers cyber-attacks directed against infrastructure such including but not limited to water treatment plants, power-grid and a detailed account on Stuxent"""
Science For All Publications, 2023
The rise of technology has revolutionized warfare, giving birth to a new form of conflict known as cyber warfare. This article examines the use of cyber warfare and its profound implications for international security. Cyber warfare encompasses various activities, including cyber espionage, terrorism, and state-sponsored cyber attacks. These tactics pose significant challenges to governments, economies, critical infrastructures, and individuals. Additionally, attributing cyber attacks remains a complex issue, impacting international norms and regulations. Therefore, fostering international cooperation, strengthening defense mechanisms, and establishing comprehensive cybersecurity frameworks to mitigate the risks and ensure global security is crucial.
2010
The evolution of the technology and the changes in the organization and control of the critical infrastructures of nations are creating a new combat front. The cases studied in this paper relate to the attack to the information systems and services of Estonia, in May 2007, and Georgia, in August 2008, occurring at the same time as the conventional military operation executed by the Russian Federation's army in the South Ossetia. The Russian Federation has been repeatedly accused of this operations, but the data collected raises doubts and in the second case-study showed the existence of a poorly organized 2 network, related to Russian criminal organizations, supporting the possibility of this being an instance of the Maoist concept of the "People's war". This paper will also show that, despite the unsophisticated resources used in most of the attacks and to promote them, the damages in the selected targets were considerable.
IEEE Technology and Society Magazine, 2014
International Journal of Cyber Warfare and Terrorism, 2017
This comparative international case study of cyber warfare provides a context for considering the evolution of cyber technologies as elements of hybrid warfare capable of creating confusion, disrupting communications, and impacting physical infrastructure (such as power grids and satellite-based communications and weapons systems). Expanding an unpublished paper recognized by the ASIS Foundation in its 2012 international student writing competition concerning global security, which compared the cyberattacks against Estonia in 2007 and the United States in 2012, this study re-examines and updates the original data in a broader analysis that primarily includes the cyberattacks against Ukraine during the 2013-2015 conflict, but also considers other incidents on the timeline of digitization. The study shows how cyber warfare, first reported in the 1990s, has become an integral component of war today for both state and non-state actors who use zombies and robot armies to penetrate nation...
—The paper focus on cyber weapons used in Advanced Persistent Threat (ATP) attacks in present and future cyber warfare. The combined use of propaganda and cyber warfare supports military operations on the ground and is exemplified with the ongoing Russian hybrid warfare in Ukraine. New models and methods to develop future trustworthy critical infrastructures in our societies are presented. Some mitigation ideas to meet the challenges of future hybrid warfare are also discussed
2011
This report addresses arguably the most serious end of the spectrum of security challenges posed by and within cyber space. It places cyber warfare in the context of national strategy to identify its essential characteristics as a strategic security phenomenon.
Accident Analysis & Prevention, 2004
S. Dova, C. Callaway, G. Gazis (eds.), Homer in Sicily, (The Heritage of Western Greece), Parnassos Press, Siracusa, 2023
Східноєвропейський національний університет ім. Лесі Українки, 2011
Analisi e diritto, 2024
"Zielone Wiadomości", 2017
Zbornik radova 1700 godina Milanskog edikta, Međunarodni naučni skup ”1700” godina Milanskog edikta, Niš 16 – 17. мај 2013, Pravni fakultet u Nišu, 845 - 856, 2013
Tạp chí Da liễu học Việt Nam
European journal of public health, 2022
Journal of Tashkent Institute of Railway Engineers, 2020
Architectural Design, 2013
Revista de Economía Institucional, 2019
Journal of Computer Science, 2008
Revista Kairós-Gerontologia
Practical lessons of the Baikal studies course on Lake Baikal, 2023