Security and Privacy in a Networked World/Cyberwars

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti

The Online Battlefield

Using IT in military context today involves various applications, for example

  • cryptography
  • communication interception (cyberespionage)
  • communication disruption (cyberattacks on infrastructure using e.g. DDOS)
  • propaganda and information warfare
  • ...



Looking back

While military cryptography can be traced back to the antiquity (e.g. scytale, the connection with IT was probably first made with Enigma.

Additional reading and links

Also in Estonian:

  • MÄGI, Harri, VITSUT, Lauri. Infosõda: visioonid ja tegelikkus. Eesti Ekspressi kirjastus 2008.