tag:blogger.com,1999:blog-8445478056622031039.post2222722956257442496..comments2023-10-24T14:06:31.567+03:00Comments on Conflicts in Cyberspace: On definitionsRain Ottishttp://www.blogger.com/profile/05791152206511385575noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-8445478056622031039.post-63083975250366567942009-08-26T14:47:14.347+03:002009-08-26T14:47:14.347+03:00Jyri,
The problem with these definitions is that ...Jyri,<br /><br />The problem with these definitions is that they are both too wide. The following activities would fit under these definitions:<br /><br />* [terrorists] communicating via e-mail<br />* [terrorists] using a web search engine to find the address of a government agency<br />* [terrorists] navigating the city streets with the help of GPS<br /><br />I am not willing to include these things under cyber terrorism. That would mean that using boots and cars and duct tape should be included in the definition of terrorism. But maybe that is just me.Rain Ottishttps://www.blogger.com/profile/05791152206511385575noreply@blogger.comtag:blogger.com,1999:blog-8445478056622031039.post-37509643663496370232009-07-28T13:29:57.741+03:002009-07-28T13:29:57.741+03:00cyber terrorism - where one party is using cyber e...cyber terrorism - where one party is using cyber environment to assure success in terrorist attacks.<br /><br /><br />http://www.i-policy.org/2009/07/defining-cyber-terrorism.html<br />Cyber-terrorism: <br />The use of information technology by terrorist groups and individuals to further their agenda. <br /><br />JyriUnknownhttps://www.blogger.com/profile/01268124067560023623noreply@blogger.comtag:blogger.com,1999:blog-8445478056622031039.post-2526705624732201632009-07-16T17:15:17.062+03:002009-07-16T17:15:17.062+03:00Malicious refers to the intent of the attack - &qu...Malicious refers to the intent of the attack - "good guys" with an intent to damage the systems of the "bad guys" are still malicious towards the system. "Good guys" hired to do pen-testing on your network are not malicious. However, you have a good point in that I need to clarify what I mean. I will look into that.<br /><br />I would dispute the second point - I am not convinced that all conflicts have to have a cyber component. They are becoming more frequent and wide spread, however.<br /><br />As for the last point - consider that one way to fight a war in the future would be cyber only, without any conventional force engagements. Alternatively, cyber may not be part of the war, if both sides are technologically backward.Rain Ottishttps://www.blogger.com/profile/05791152206511385575noreply@blogger.comtag:blogger.com,1999:blog-8445478056622031039.post-71151370281016953432009-07-16T15:27:35.154+03:002009-07-16T15:27:35.154+03:00cyber attack -
Is it malicious if it's the go...cyber attack - <br />Is it malicious if it's the good guys? ;)<br />Not influence information, systems, but alter<br /><br />cyber conflict -<br />all conflicts now have a cyber dimension!<br /><br />cyber war -<br />I think that all future wars will be a mixture of cyber and non-cyber attack and defense, with difficulty in drawing the line where each type begins and endsK_Geershttps://www.blogger.com/profile/09442350153259283621noreply@blogger.com