TITLE

The growing risk

AUTHOR(S)
O'Flaherty, Kate
PUB. DATE
May 2014
SOURCE
SC Magazine: For IT Security Professionals (UK Edition);May/Jun2014, p14
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the risks associated with cyber attacks. Topics discussed include incidents of cyber attack such as in Ukraine after the takeover of the Autonomous Republic of Crimea and the true domestic cyber war raged by the Russian Cyber Command against military enterprises, a brief history of cyber espionage, attacks allegedly orchestrated by China, the growing complexity of attack methods, and protection against espionage. INSET: CYBER WARFARE: A part to play.
ACCESSION #
100584066

 

Related Articles

  • China Youth Daily: Calmly Deal with the U.S.'s New Assault in Cybersecurity.  // Chinascope;May/Jun2014, Issue 69, p8 

    The article focuses on an opinion article written by Shen Yi, a professor of international politics at Fudan University, published by "China Youth Daily" on May 20, 2014, regarding the U.S.'s recent cyber espionage charge against five Chinese military officers. It offers three guidelines that...

  • Ghosts in the machines. Baraniuk, Chris // New Scientist;7/4/2015, Vol. 227 Issue 3028, p38 

    The article discusses cyberterrorism, hacking and military cyberspace operations, including the 2014 hacking of the American entertainment subsidiary Sony Pictures Entertainment allegedly by the North Korean government. An overview of efforts in computer security to prevent cyberterrorism is...

  • The new Requirement for a Fifth Dimension of war: Cyber Intelligence. Bayraktar, Gokhan // Proceedings of the International Conference on Cyber Warfare & S;2014, p9 

    The structure and operational domain of intelligence concept has been evolving continuously in parallel to the change in threat perceptions since it became a discipline more than half a century back. The difficulties encountered in defining the Intelligence concept and its operational domain is...

  • Rethinking the Cyber Domain and Deterrence. Denning, Dorothy E. // JFQ: Joint Force Quarterly;2015 2nd Quarter, Issue 77, p8 

    The author informs about the correlation between cyberspace operations and traditional domains of land, air, and space in warfare and deterrence in cyberspace. Topics include use of computer networks in cyberspace and road networks in the land domain of warfare, constraints on malleability of...

  • CYBERARMIES RISING? Sustar, Lee // SC Magazine: For IT Security Professionals (15476693);Sep2015, Vol. 26 Issue 9, p16 

    The article examines the boundaries between espionage and acts of war in the virtual world. Topics discussed include the circumstances when cyberespionage crosses the line into cyberwar, the data breach at the U.S. Office of Personnel Management (OPM), and the need for the U.S. government to...

  • THE SECRET WAR. Piore, Adam // Popular Mechanics;Jan2012, Vol. 189 Issue 1, p52 

    The article reports on the issues of computer hacking, which is hampering the economy of American industry. According to the founder of Red Tiger Security in Houston, Jonathan Pollet, computer hackers could have crippled the business without informing. Further it focuses on the Digital security...

  • You are an APT target. Ferraro, Phillip // SC Magazine: For IT Security Professionals (15476693);Apr2013, Vol. 24 Issue 4, p16 

    The article focuses on cyber security attacks that are known as advanced persistent threats (APT). Hacker groups intend to breach an organization and steal its intellectual property and other business sensitive information. It cites a report from Mandiant which details its investigations into a...

  • INTERNATIONAL CYBERWAR 2033. Cosby, Lloyd N. "Neale" // Army AL&T Magazine;Jan-Mar2015, p177 

    The article provides a fictional outlook on the virtual training and warfare for 2033. Topics discussed include a wristwatch that can indicate an emergent national security crisis, training, tracking, updating, retraining and rehearsing the enemy cyberthreat and disruption of the Global...

  • Cyber Conflicts: Addressing the Regulatory Gap. Glorioso, Ludovica // Philosophy & Technology;Sep2015, Vol. 28 Issue 3, p333 

    The article reports on cyber conflicts. Topics discussed include use of information and communication technologies (ICTs), cyber warfare and hacktivism, and cyber crime and cyber terrorism. Also being discussed are digitization process by governments and international institutions, and military...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics