scispace - formally typeset
Search or ask a question
Topic

Cyberwarfare

About: Cyberwarfare is a research topic. Over the lifetime, 1859 publications have been published within this topic receiving 19601 citations.


Papers
More filters
Journal ArticleDOI
01 May 2011
TL;DR: Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as Stuxnet, which followed a completely new approach that's no longer aligned with confidentiality, integrity, and availability thinking.
Abstract: Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as Stuxnet Not only was Stuxnet much more complex than any other piece of malware seen before, it also followed a completely new approach that's no longer aligned with conven tional confidentiality, integrity, and availability thinking Con trary to initial belief, Stuxnet wasn't about industrial espionage: it didn't steal, manipulate, or erase information Rather, Stuxnet's goal was to physically destroy a military target-not just meta phorically, but literally Let's see how this was done

1,548 citations

Journal ArticleDOI
28 Jan 2011-Survival
TL;DR: In this article, the authors discuss the political and strategic context in which new cyber threats are emerging, and the effects the worm has generated in this respect, and suggest that cyber offers great potential for striking at enemies with less risk than using traditional military means, but careful strategic thought is required in comparing the cost and benefits of cyber versus traditional military attack.
Abstract: The discovery in June 2010 that a cyber worm dubbed ‘Stuxnet’ had struck the Iranian nuclear facility at Natanz suggested that, for cyber war, the future is now. Yet more important is the political and strategic context in which new cyber threats are emerging, and the effects the worm has generated in this respect. Perhaps most striking is the confluence between cyber crime and state action. States are capitalising on technology whose development is driven by cyber crime, and perhaps outsourcing cyber attacks to non-attributable third parties, including criminal organisations. Cyber offers great potential for striking at enemies with less risk than using traditional military means. It is unclear how much the Stuxnet program cost, but it was almost certainly less than the cost of single fighter-bomber. Yet if damage from cyber attacks can be quickly repaired, careful strategic thought is required in comparing the cost and benefits of cyber versus traditional military attack. One important benefit of cyber ...

621 citations

Book
Thomas Rid1
01 Sep 2013
TL;DR: Cyber War will not take place: Cyber War Will Not Take Place as mentioned in this paper is a recent book by Thomas Rid, who argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways.
Abstract: "Cyber war is coming," announced a land-mark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?

341 citations

BookDOI
01 Mar 2013
TL;DR: The Tallinn Manual as mentioned in this paper identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts, addressing topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality.
Abstract: The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth the rule's basis in treaty and customary law, explains how the group of experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application.

337 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
74% related
International relations
41.7K papers, 829K citations
69% related
Voting
33.6K papers, 791.3K citations
67% related
The Internet
213.2K papers, 3.8M citations
67% related
Democracy
108.6K papers, 2.3M citations
67% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202384
2022176
202134
202075
201993
2018105