Security and Privacy in a Networked World/Cyberwars

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti

The Online Battlefield

Using IT in military context today involves various applications, for example

  • cryptography
  • communication interception (cyberespionage)
  • communication disruption (cyberattacks on infrastructure using e.g. DDOS)
  • propaganda and information warfare
  • ...



Looking back

While military cryptography can be traced back to the antiquity



Additional reading and links

Also in Estonian:

  • MÄGI, Harri, VITSUT, Lauri. Infosõda: visioonid ja tegelikkus. Eesti Ekspressi kirjastus 2008.