Security and Privacy in a Networked World/Cyberwars: erinevus redaktsioonide vahel

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti
Resümee puudub
2. rida: 2. rida:


Using IT in military context today involves various applications, for example
Using IT in military context today involves various applications, for example
* propaganda and information warfare (including controlling the public on both sides of the 'front')
* cryptography  
* cryptography  
* communication interception (cyberespionage)
* communication interception (cyberespionage)
* communication disruption (cyberattacks on infrastructure using e.g. DDOS)
* communication disruption and sabotage (cyberattacks on infrastructure using e.g. DDOS)
* propaganda and information warfare
* ...
 




Cryptography has a history that spans far before the Internet age. So does propaganda, albeit the information warfare has gained many new measures with the advent of social media (as exemplified by "Facebook revolutions" worldwide). Cyberespionage has its predecessors in various technologies of the mid-20th century. While communication disruption and sabotage have some ancestors in the pre-IT era, its true potency has only been realized recently - the first widely published case was likely [https://en.wikipedia.org/wiki/Stuxnet Stuxnet]. However, current threat analyses point out actual attack vectors towards critical infrastructure, e.g. the power grid


== Looking back ==
== Looking back ==

Redaktsioon: 14. aprill 2014, kell 08:27

The Online Battlefield

Using IT in military context today involves various applications, for example

  • propaganda and information warfare (including controlling the public on both sides of the 'front')
  • cryptography
  • communication interception (cyberespionage)
  • communication disruption and sabotage (cyberattacks on infrastructure using e.g. DDOS)


Cryptography has a history that spans far before the Internet age. So does propaganda, albeit the information warfare has gained many new measures with the advent of social media (as exemplified by "Facebook revolutions" worldwide). Cyberespionage has its predecessors in various technologies of the mid-20th century. While communication disruption and sabotage have some ancestors in the pre-IT era, its true potency has only been realized recently - the first widely published case was likely Stuxnet. However, current threat analyses point out actual attack vectors towards critical infrastructure, e.g. the power grid

Looking back

While military cryptography can be traced back to the antiquity (e.g. scytale, the connection with IT was probably first made with Enigma.

Additional reading and links

Also in Estonian:

  • MÄGI, Harri, VITSUT, Lauri. Infosõda: visioonid ja tegelikkus. Eesti Ekspressi kirjastus 2008.