TITLE

Cyber Domain Conflict in the 21st Century

AUTHOR(S)
Cilluffo, Frank J.; Cardash, Sharon L.
PUB. DATE
January 2013
SOURCE
Journal of Diplomacy & International Relations;Winter/Spring2013, Vol. 14 Issue 1, p41
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses international political conflict in cyberspace, with a particular focus on policy issues related to cyberspace. The authors stress the speed with which events occur in cyberspace and the importance of security at the public, private, and individual levels. According to the author, digital technologies have empowered nonstate actors who were previously unable to play a major role in national and international security issues. Details on the relationship between cyber warfare and physical warfare are presented. Other topics include espionage, the Internet, and transparency.
ACCESSION #
87977324

 

Related Articles

  • FirstNet releases cybersecurity plan, seeks comments by Oct. 16--for now. Jackson, Donny // Urgent Communications Exclusive Insight;10/8/2015, p1 

    The article reports on the proposed cybersecurity requirements released by the organization First Responder Network Authority (FirstNet) that aims to provide public safety access when responding to emergencies, and requests for comments to be submitted by October 16, 2015.

  • Preparing the Army to Prevent, Shape And Win in Cyberspace. Hernandez, Rhett A. // Army Magazine;Oct2013, Vol. 63 Issue 10, p191 

    The article focuses on the cyberspace warfare readiness of the U.S. Army. The Army Cyber Command's investment in people and technology is seen as enabling the service to deter aggressors and to prevent future conflict across domains. In addressing cyberspace challenges, the Army Cyber Command is...

  • Chinese Hackers, "Active Defense" and Other Bad Ideas. MCGRAW, GARY // Information Security;Apr2013, Vol. 15 Issue 3, p4 

    The article discusses a report from security firm Mandiant confirming that cyberespionage attacks have been perpetrated by the Chinese. It notes though that cyperespionage is not the same as cyberwar and that attribution through forensics is different from active attribution during an actual...

  • Chinese Views on the Information "Center of Gravity": Space, Cyber and Electronic Warfare. Costello, John // China Brief;4/17/2015, Vol. 15 Issue 8, p10 

    The article offers an analysis of the view of China on cyberspace and electronic warfare, particularly in the context of command, control, computers, communication, intelligence, reconnaissance and surveillance (C4ISR) complexes and their applications in the military.Topics covered include...

  • Pakistan and India Cyber Security Strategy. MALIK, MUHAMMAD BAQIR // Defence Journal;Jun2014, Vol. 17 Issue 11, p59 

    The article focuses on the need of Pakistan and India to develop a cyber security strategy to prevent non state actors from exploiting their hostile relationship. It offers an overview of the cyber security strategy of India and Pakistan to address the growth of cyber crime and spying of other...

  • Information warfare and international security. Ehlers, Vernon J. // Officer;Sep99, Vol. 75 Issue 8, p28 

    Discusses information warfare and international security. Definition of information warfare; Categories of attack; Assessment of a threat; Responses to the threat; Provisions of the Presidential Decision Directives 62 and 63 on Critical Infrastructure Protection.

  • CYBERZAGROÅ»ENIA NA POCZÄ„TKU XXI WIEKU. LAKOMY, MIRON // Przeglad Zachodni;2012, Issue 4, p205 

    The article tackles the problem of sensitivity to threats that appear in cyber space in the security policies of selected international agents, including among others: the USA, Poland, Israel, Russia, the European Union and the North Atlantic Treaty. Cyber threats intensified with the...

  • Needed, international treaty on cyberspace. DUGGAL, PAVAN // Sahara Time;7/20/2013, Vol. 11 Issue 529, p38 

    The article provides information on the importance of cyber security and mentions about the requirement of an international treaty on legal and policy issues related to cyberspace. It mentions that availability of limitless cyberspace enables any person to launch a cyber attack from any location...

  • PRIVACY IN JEOPARDY? VERMA, VIRESH // Sahara Time;7/20/2013, Vol. 11 Issue 529, p30 

    The article discusses the planning of Indian government to launch a surveillance program that allows security agencies to track the emails and phone calls of an individual without oversight by courts and presents the views of several professionals who deal with cyber security regarding the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics