Related Chapters for "Safeguarding Cyber-Security, Fighting in Cyberspace"
June 2013
-
Jun 2013
Bullets, Bombs, and Ice Cream
Author: Nicholas Kaempffer
Publisher: Canadian Military Journal (CMJ)
This article addresses insurgent utilization of Google Earth to plan attacks. More on «Bullets, Bombs, and Ice Cream»
May 2013
-
May 2013
The Effect of Cyberwar Technologies on Force Buildup: The Israeli Case
Author: Gil Baram
Publisher: Institute for National Security Studies (INSS)
This article examines Israel's cyber security doctrine and its preparation for cyber attacks. More on «The Effect of Cyberwar Technologies on Force Buildup: The Israeli Case» -
May 2013
The Classic Cyber Defense Methods Have Failed – What Comes Next?
Author: Amir Averbuch, Gabi Siboni
Publisher: Institute for National Security Studies (INSS)
This article examines the weaknesses of traditional cyber security defense strategies in light of increasingly sophisticated attacks. More on «The Classic Cyber Defense Methods Have Failed – What Comes Next?» -
May 2013
The Proliferation of Weapons in Cyberspace
Author: Daniel Cohen, Aviv Rotbart
Publisher: Institute for National Security Studies (INSS)
This article talks about the use of cyber technology as a form of weapon. More on «The Proliferation of Weapons in Cyberspace» -
May 2013
Duqu’s Dilemma: The Ambiguity Assertion and the Futility of Sanitized Cyberwar
Author: Matthew Crosston
Publisher: Institute for National Security Studies (INSS)
This article argues that the cyber domain has unique characteristics which make the application of conventional international law problematic. More on «Duqu’s Dilemma: The Ambiguity Assertion and the Futility of Sanitized Cyberwar»
February 2013
-
Feb 2013
Future Technology and Strategic Stability
Author: Ronald F. Lehman II
Publisher: Strategic Studies Institute of the US Army War College (SSI)
This chapter explores how technology influences both the context for human behavior and decisionmaking in the context of strategic stability. More on «Future Technology and Strategic Stability»
January 2013
-
2013
Some Reflections on the Intersection of Law and Ethics in Cyber War
Author: Charles J Dunlap Jr
Publisher: Air Force Research Institute (AFRI)
This article reflects upon issues that illustrate how legal and ethical concerns intersect in the cyber realm. More on «Some Reflections on the Intersection of Law and Ethics in Cyber War» -
2013
The Interim Years of Cyberspace
Author: Robert M Lee
Publisher: Air Force Research Institute (AFRI)
This article reflects on how cyberspace is reaching its full potential as a domain of warfare equal to the traditional domains. More on «The Interim Years of Cyberspace» -
2013
A Case for a Cyberspace Combatant Command
Author: Shawn M Dawley
Publisher: Air Force Research Institute (AFRI)
This article puts forth arguments in favor of making US Cyber Command (USCYBERCOM) a functional combatant command (COCOM). More on «A Case for a Cyberspace Combatant Command» -
2013
Computer Security: The Achilles' Heel of the Electronic Air Force?
Author: Roger R Schell
Publisher: Air Force Research Institute (AFRI)
This article outlines the computer security problem and shows how the security kernel approach meets the requirements for a workable solution. More on «Computer Security: The Achilles' Heel of the Electronic Air Force?»


