TITLE

Global Insights: Russia Refines Cyber Warfare Strategies

AUTHOR(S)
Weitz, Richard
PUB. DATE
August 2010
SOURCE
World Politics Review (19446284);8/10/2010, p24
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports on the launch by Russian citizens and their sympathizers of a coordinated cyber warfare offensive strategy that disabled Georgian Web sites. A report issued by the U.S. Cyber-Consequences Unit found that the malign modifications of publicly available commercial software designed for administrators of computer networks were used by the cyber attackers. The report concludes that the attackers have been instructed by some central controllers to limit the damage they inflicted. It also offered three recommendations to counter cyber wars.
ACCESSION #
52895805

 

Related Articles

  • Global Insights: Russia Refines Cyber Warfare Strategies. Weitz, Richard // World Politics Review;8/10/2010, p24 

    The article reports on the launch by Russian citizens and their sympathizers of a coordinated cyber warfare offensive strategy that disabled Georgian Web sites. A report issued by the U.S. Cyber-Consequences Unit found that the malign modifications of publicly available commercial software...

  • ID THEFT IN CYBERSPACE. DOBRINOIU, Maxim // International Conference : CKS - Challenges of the Knowledge Soc;2014, p5 

    Obtaining personal data, identification data, including data which allow the use of a electronic payment instrument, or any other data generated in the context of one person's activities in the social, economic or financial life, without its consent or by deceit, if this occurs in computer...

  • Alexander: Situational Awareness Big Hurdle For Cyber Command. Rutherford, Emelie // Defense Daily;6/4/2010, Vol. 246 Issue 46, p7 

    The article focuses on securing the U.S. Army's computing networks from possible cyber-attacks and vulnerabilities. Army General, Keith Alexander said U.S. computing networks is facing challenges like known and unknown cyber vulnerabilities and weak situational awareness. He further asserted the...

  • AN ENEMY WITHOUT BOUNDARIES. Porche III, Isaac R.; Sollinger, Jerry M.; McKay, Shawn // U.S. Naval Institute Proceedings;Oct2012, Vol. 138 Issue 10, p34 

    The article offers comments on the need for a strategy and policy to respond to cyber attack as it is allegedly impossible to block every cyber attack. It is suggested that the industries learn from the vulnerability of the networks attacked while understanding that there is no single defense...

  • Socialno-psiholoÅ¡ke implikacije kibernetskega terorizma. Prislan, Kaja; Bernik, Igor // Varstvoslovje: Journal of Criminal Justice & Security;2013, Vol. 15 Issue 3, p357 

    Purpose: This paper intends to present the synergy between unrealistic notions about technology and terrorism and the cyberterrorists' real capabilities and activities. At the same time, the paper also points to the threat, which must not be neglected from the information security point of view,...

  • U.S. Air Force sets up cyberspace command against continuing China attacks.  // East-Asia-Intel Reports;4/9/2008, p9 

    The article reports on the cyberspace command created by the U.S. Air Force to provide both defensive and offensive computer network weapons against continuing Chinese attacks. According to Major General William Lord, the cyber forces commander, numerous Chinese-origin probes may be...

  • TEST BED FOR CYBER-ATTACKS MITIGATION. Baráth, Július; Harakal, Marcel // Proceedings of the Scientific Conference AFASES;May2011, p587 

    The paper use Georgian case as a real example of cyber-attack, shows methods used to paralyse country institutions and the effects achieved. The case initiated the need to create test environment for simulation and understanding of this phenomena, serving as test bed for research,...

  • Cashing in on cyberwarfare. Hubbard, Jessica // Finweek;4/25/2013, p16 

    The article offers the author's insights on exploits in cyberspace. The author considers computer code as the most prolific weapon on a cyberwarfare, in which the said codes with evil intent can cause vulnerability in an entire computer network. She features an interview of a South African...

  • Don't hack back. HOLMES, GORDON // Computer Shopper;Apr2016, Issue 338, p12 

    The author shares his views on a proposal that victims of cyberattacks should retaliate and attack back the hackers. Topics discussed include the plans to launch legislation in the U.S. that will support companies that retaliate against cyberattacks, hackers' strategy of not using their own...

  • Shanghai to Dispose of Its Dead in Cyberspace. Goode, Stephen // Insight on the News;05/08/2000, Vol. 16 Issue 17, p4 

    Provides information on a proposed Web site in Shanghai, China that will allow relatives to mourn their dead in cyberspace. Features of the site; Advantages of the Web site; Reference to a report from the `Shanghai Daily' newspaper.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics