Security and Privacy in a Networked World/Cyberwars: erinevus redaktsioonide vahel

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
Resümee puudub
1. rida: 1. rida:
== History ==
== The Online Battlefield ==


...
Using IT in military context today involves various applications, for example
* cryptography
* communication interception (cyberespionage)
* communication disruption (cyberattacks on infrastructure using e.g. DDOS)
* propaganda and information warfare
* ...
 
 
 
 
== Looking back ==
 
While military cryptography can be traced back to the antiquity





Redaktsioon: 14. aprill 2014, kell 08:09

The Online Battlefield

Using IT in military context today involves various applications, for example

  • cryptography
  • communication interception (cyberespionage)
  • communication disruption (cyberattacks on infrastructure using e.g. DDOS)
  • propaganda and information warfare
  • ...



Looking back

While military cryptography can be traced back to the antiquity



Additional reading and links

Also in Estonian:

  • MÄGI, Harri, VITSUT, Lauri. Infosõda: visioonid ja tegelikkus. Eesti Ekspressi kirjastus 2008.