Security and Privacy in a Networked World/Cyberwars: erinevus redaktsioonide vahel

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
Resümee puudub
13. rida: 13. rida:
== Looking back ==
== Looking back ==


While military cryptography can be traced back to the antiquity
While military cryptography can be traced back to the antiquity (e.g. [https://en.wikipedia.org/wiki/Scytale scytale], the connection with IT was probably first made with Enigma.
 
 
 


== Additional reading and links ==
== Additional reading and links ==

Redaktsioon: 14. aprill 2014, kell 08:15

The Online Battlefield

Using IT in military context today involves various applications, for example

  • cryptography
  • communication interception (cyberespionage)
  • communication disruption (cyberattacks on infrastructure using e.g. DDOS)
  • propaganda and information warfare
  • ...



Looking back

While military cryptography can be traced back to the antiquity (e.g. scytale, the connection with IT was probably first made with Enigma.

Additional reading and links

Also in Estonian:

  • MÄGI, Harri, VITSUT, Lauri. Infosõda: visioonid ja tegelikkus. Eesti Ekspressi kirjastus 2008.