All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage and attacks on critical infrastructure can target decision makers, weapons systems and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections – Strategic Viewpoints and Technical Challenges & Solutions – and highlights the growing connection between computer security and national security.
IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.
Some of the areas we publish in:
-Databases and information systems
-All aspects of physics
-The knowledge economy
-Understanding and responding to terrorism
This book argues that Network Centric Warfare (NCW) influences how developed militaries operate in the same fashion that an operating system influences the development of computer software.
It examines three inter-related issues: the overwhelming military power of the United States; the growing influence of NCW on military thinking; and the centrality of coalition operations in modern military endeavours. Irrespective of terrorist threats and local insurgencies, the present international structure is remarkably stable – none of the major powers seeks to alter the system from its present liberal character, as demonstrated by the lack of a military response to US military primacy. This primacy privileges the American military doctrine and thus the importance of NCW, which promises a future of rapid, precise, and highly efficient operations, but also a future predicated on the ‘digitization’ of the battle space. Participation in future American-led military endeavours will require coalition partners to be networked: ‘interoperability’ will therefore be a key consideration of a partner’s strategic worth.
Network Centric Warfare and Coalition Operations will be of great interest to students of strategic studies, international security, US foreign policy and international relations in general.
Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.
Technology is an essential part of society in the Information Age. Warfare has always had a technological dimension. In the era of information and the interconnected world, the critical infrastructure of nations has become increasingly reliant upon computer networks: by using the methods of computer network attacks many critical functions of a State could be damaged. This has raised a discussion related to States’ national and economic security concerning a new battlefield, warfare in cyberspace.
This report surveys one new facet of technology: computer network attacks, from the framework of the law of armed conflict by asking if the existing law of armed conflict, the main parts of which have their origins in the legacies of two World Wars, applies to computer network attacks. Moreover, the report addresses the questions of the perpetrators of the computer network attacks in the context of the law of armed conflict, what targets can be attacked with the means and methods of computer network attacks and how these attacks should be conducted under the laws of armed conflict.
Recent years have seen a rapid development of a relatively new trend of battle: cyber-warfare. Used in targeting various official government websites, home pages of financial institutions and famous and influential internet portals, cyber-attacks have the ability to paralyze the work of banks, news broadcasts and even hurt the reputation of a country (like in the case of Georgia), with false and distorted information and data being the main casualties. This book gives an insight on the highly interesting topic of cyber-warfare, the latest form of battle.