Explore chapters and articles related to this topic
Cyber Defence and Countermeasures
Published in Stanislav Abaimov, Maurizio Martellini, Cyber Arms, 2020
Stanislav Abaimov, Maurizio Martellini
The Tallinn Manual on International Law Applicable to Cyber Warfare of 2013 presented the views of twenty international law scholars and practitioners on how international law applies to cyber warfare and proposes ninety-five “black-letter rules” relevant to cyber conflict that can be derived from international law (including law related to sovereignty, state responsibility, and neutrality, as well as the UN Charter and the Geneva Conventions).213
Data Analysis
Published in Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett, Mathematics in Cyber Research, 2022
Raymond R. Hill, Darryl K. Ahner
Cyber warfare is the collective term used to classify the use of technology to attack IT systems. The instruments within the cyber warfare domain are varied. A computer virus is a mobile computer program that can infect a computer causing all sorts of problems, from degrading computer performance all the way to completely incapacitating the system. Other computer programs can attack the IT system to allow unauthorized access to the system after which a host of hostile actions can occur.
Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?
Published in Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta, Information Security and Optimization, 2020
Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar
Cyber-warfare entails acts by a nation-state or foreign entity directed at disrupting and threatening to destroy the systems or communication networks of another country by, for example, computer viruses or denial-of-service attacks. The RAND Corporation’s work gives guidance to military and civilian decision-makers on ways to defend against the harmful effects of cyber-warfare on digital infrastructure in a nation (Dobbing and Cole 2014).
Big Data Analytics in Cyber Security: Network Traffic and Attacks
Published in Journal of Computer Information Systems, 2021
In recent years, cyber security, cyber warfare, and cyber defense has played a crucial role in US systems. Cyber warfare consists of multiple unique threats that can be divided into cyber espionage (cyber spying) and cyberattacks. Cyberattacks include viruses, worms, malware, Trojans, botnets, malicious insiders, denial of service (DoS), distributed denial of service (DDoS), and server side injection (SSI), etc.1 Critical networks are one of the possible targets of cyber warfare. Cyber defense has also been emerging as a high priority can be categorized into passive cyber defense and active cyber defense. Passive cyber defense methods include virus detection, firewalls, patches, and threat detection, etc., but the increasing ineffectiveness in preventing threats and attacks through passive cyber defense has resulted in the emergence of active cyber defense, which has the synchronized and real-time capabilities to analyze, identify, and mitigate vulnerability and threats. Approaches to active cyber defense can be categorized into detection and forensics, deception, and attack termination.2,3