TITLE

The Secret Cyber War

AUTHOR(S)
Ismai, Salim Abou
PUB. DATE
March 2011
SOURCE
Military Technology;2011, Vol. 35 Issue 3, p5
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the issues concerning cyberterrorism in the Middle East. It highlights the development of a worm-type computer virus by Israel which allegedly infiltrated the nuclear facilities in Iran. It outlines the claims of the Syrian government that the Israeli Air Force fighter jets penetrated the early warning system of the country. It is inferred that cyber attacks will be the utimate war tool.
ACCESSION #
59691391

 

Related Articles

  • China reports millions of Conicker worm infections. Fletcher, Owen // ComputerWorld Hong Kong;May2010, Vol. 26 Issue 4, p21 

    The article discusses a report about the proliferation of the Conficker B virus in China's Internet Protocol (IP) addresses in 2009. The information, posted at China's National Computer Network Emergency Response Technical Team (CNCERT) website, revealed that the virus has affected about 7...

  • Shadow War. Sweetman, Bill // Defense Technology International;Jan2012, Vol. 6 Issue 1, p14 

    The article discusses how the continuous attack from cyberespionage or cybernetwork exploitation (CNE) like the Advanced Persistent Threat (APT) has forced the U.S. to delay programs and divert resources into cumbersome security precautions. It says that APT attacks break into ostensibly secure...

  • PC VIRUS ATTACKS IN SMALL FIRMS: EFFECTS OF RISK PERCEPTIONS AND INFORMATION TECHNOLOGY COMPETENCE ON PREVENTIVE BEHAVIORS. MARIANI, MARCO G.; ZAPPALÁ, SALVATORE // TPM: Testing, Psychometrics, Methodology in Applied Psychology;Mar2014, Vol. 21 Issue 1, p51 

    While Information Technology (IT) is undeniably useful in improving organizational efficiency, it is also vulnerable: a virus attack can interrupt the work of many employees. Human behaviors, practices and errors are possible causes of a computer virus attack and the consequent infections. Even...

  • Computer Worm Classification. Pratama, Andhika; Rafrastara, Fauzi Adi // International Journal of Computer Science & Information Security;Apr2012, Vol. 10 Issue 4, p21 

    To find out more the ins and the outs of computer worm, including how the work and how to overcome, it is necessary to study the classification of computer worm itself first. This paper presents taxonomy for classifying worm structure, worm attack, worm defense, and user defense.

  • Snooping dragon.  // India Today;4/5/2010, p3 

    The article reports on the cyberwar between India and China despite the fact that the two countries are talking peace. Organised Chinese hackers are said to have targeted Indian computers with deadly digital weapons. A computer problem scenario based on the inaugural of the Commonwealth Games in...

  • To catch a thief. Marks, Paul // New Scientist;6/9/2012, Vol. 214 Issue 2868, p24 

    The article discusses the complex computer virus Flame and its potential risk for national infrastructure. Topics include how Flame temporarily disrupted the Iranian oil industry, how Flame is capable of stealing, transmitting and deleting sensitive information, and the difficulty of locating...

  • Letter from the Middle East (2). Ismail, Salim Abu // Military Technology;2010, Vol. 34 Issue 12, p11 

    The article focuses on the war against the malicious STUXNET virus which is considered as the most destructive virus to attack major industrial complexes. STUXNET causes power plants or pipelines to explode or disable nuclear facilities in Iran. It also affects networks and systems with...

  • CYBER THREATS And their various types. SINGH, RAJIV KUMAR // Electronics For You;Jun2013, Vol. 2 Issue 2, p38 

    The article looks at cyber threats and discusses various types of cyber threats. It notes that cyber threats can be classified as passive and active attacks. Various types of cyber threats were mentioned including viruses, computer worms, and Trojan horse malicious software program. Several...

  • Mission Critical Issues on the World Stage: Let us know about your prize project. Heslin, Kevin // Mission Critical;Jan/Feb2011, Vol. 4 Issue 1, p6 

    An introduction to the journal is presented in which the editor discusses the story about Stuxnet and the history of the worm published within the issue by Lee Gallant.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics