Cyberwarfare: Genesis and doctrinal outlines

被引:3
|
作者
Kapto, A. S. [1 ]
机构
[1] RAS, Inst Sociopolit Res, Dept Polit Anal & Strateg Assessments, Moscow, Russia
关键词
Internet Addiction; Defense Advance Research Project Agency; Armed Attack; National Security Agency; Nonstate Actor;
D O I
10.1134/S1019331613040023
中图分类号
N09 [自然科学史]; B [哲学、宗教];
学科分类号
01 ; 0101 ; 010108 ; 060207 ; 060305 ; 0712 ;
摘要
The development of machines and technologies and the almost universal distribution of innovations lead to new social phenomena that require response, monitoring, and control measures. One such phenomenon is cyberwarfare, a new kind of confrontation that is being actively used both within individual states and at the international level. The author analyzes the development and legal formalization of the phenomenon, the current concepts describing its various components, and the international experience in providing information security and cybersecurity, including preventive measures and aggressive counteraction.
引用
收藏
页码:357 / 364
页数:8
相关论文
共 50 条
  • [21] By Disanalogy, Cyberwarfare Is Utterly New
    Bringsjord S.
    Licato J.
    Philosophy & Technology, 2015, 28 (3) : 339 - 358
  • [22] Cyberwarfare Readiness in the Maritime Environment
    Harris, Diop Ausar
    ICEIS: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2, 2022, : 119 - 125
  • [23] Computer security: Is this the start of cyberwarfare?
    Sharon Weinberger
    Nature, 2011, 474 : 142 - 145
  • [24] Challenges of Civilian Distinction in Cyberwarfare
    Rowe, Neil C.
    ETHICS AND POLICIES FOR CYBER OPERATIONS: A NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE INITIATIVE, 2017, 124 : 33 - 48
  • [25] Cyberwarfare: From the Trenches to the Clouds
    Greiman, Virginia
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 156 - 162
  • [26] Cyberwarfare: Western and Chinese Allegations
    Kshetri, Nir
    IT PROFESSIONAL, 2014, 16 (01) : 16 - 19
  • [27] A Framework for Cyberwarfare Attribution Techniques
    Noor, Muaaz
    Sithungu, Siphesihle
    Lebea, Khutso
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2024, VOL 7, 2024, 1003 : 407 - 417
  • [28] Stuxnet: Dissecting a Cyberwarfare Weapon
    Langner, Ralph
    IEEE SECURITY & PRIVACY, 2011, 9 (03) : 49 - 51
  • [29] CyberWarfare, The Declaration of Digital War
    Richardson, Jacques G.
    FORESIGHT, 2009, 11 (05): : 85 - +
  • [30] Lanchester's Equations and Cyberwarfare
    Markowsky, George
    Markowsky, Linda
    PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 2, 2021, : 956 - 963