• Corpus ID: 150639345

Impact of Alleged Russian Cyber Attacks

  title={Impact of Alleged Russian Cyber Attacks},
  author={William Ashmore},
Abstract : High-profile cyber attacks against Estonia and Georgia have brought the subject of cyber security from the realm of internet magazines to mainstream media outlets. These cyber attacks have increased the perceptions of animosity between the Russian Federation and the former Soviet satellites. The cyber attacks that have occurred in the last few years have shown the vulnerabilities of using the internet and the weaknesses of cyber defenses. Regional organizations, such as the North… 
Cyber security in developing countries, a digital divide issue
A qualitative study of cyber warfare between Russia and Georgia shows that disadvantaged states are subject to cyber insecurity, which serves as a litmus test for the level of its cyber power that, in turn, is indicative of the country's strategic political standing among other states.
Cyber attack: A dull tool to shape foreign policy
  • Emilio Iasiello
  • Computer Science
    2013 5th International Conference on Cyber Conflict (CYCON 2013)
  • 2013
It is shown that as a result of geopolitical tensions, cyber attacks were implemented to further nation state objectives in support of foreign policy considerations and failed to achieve their respective outcomes despite successful deployment against their intended targets.
Cyberweapons: Leveling the International Playing Field
  • Ross Rustici
  • Political Science
    The US Army War College Quarterly: Parameters
  • 2011
One of the largest security concerns facing the United States today is how to mitigate its vulnerability to cyberweapons. Over the past twenty years, cyberthreats have evolved from solitary hackers
Attribution, state responsibility, and the duty to prevent malicious cyber-attacks in international law
The impact of the post-9/11 invasion of Afghanistan by the United States and NATO forces is analyzed and it is determined that a burgeoning rule of attribution may be present which would impact the attribution of malicious cyber-attacks to states.
Simulating political and attack dynamics of the 2007 Estonian cyber attacks
A causal model of cyber attacks and riots in 2007 that seemed to be highly coordinated and politically motivated, causing short-lived but substantial impact to Estonia's cyber and economic systems is created.
A Game of Code: Challenges of Cyberspace as a Domain of Warfare
The military capabilities that the world witnesses in modern day armed conflicts are a sort of science fiction brought to life. Most of the techniques in cyber warfare were never thought possible,
Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies
Abstract : This study proposes how cyberspace operations can best support online resistance movements to influence adversary national will or affect political behavior to achieve U.S. strategic
Counterterrorism Policies and Institutions in Northern Europe and the Baltic States
Statistically, the countries of Northern Europe and the Baltic States have been among the least likely in the Western world to experience terrorism. However in recent years terrorist acts and
Kyberterorismus - mediální hrozba
The thesis outlines the development of the concept of terrorism from its beginning to the present and shows Cyber terrorism as a latent threat to the information society.
Do the Principles of War Apply to Cyber War
Abstract : The purpose of this monograph is to examine whether the Principles of War, as defined in the U.S. military's Joint Publication 3-0, Joint Operations, can be applied to cyber war. Since


Black Ice: The Invisible Threat of Cyber-Terrorism
From the Publisher: The first book to define the clear and present danger posed by a cyber-terrorist attack on the U.S. computer- and network-dependent infrastructure. The pages are packed with
Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues
A closer look at technical and policy considerations for next-generation Internet protocols to enhance track and trace capabilities is taken.
The Bear Went Through the Mountain: Russia Appraises its Five-Day War in South Ossetia
The August 2008 Russian-Georgia conflict was the first Russian full-scale use of force against a former member of the Soviet Union. This paper looks at the August conflict solely from the vantage
Information Warfare: Separating Hype from Reality
The authors urge the United States to use its enormous IO advantage to deal with complex national security issues beyond the Department of Defense, for example, in swaying global opinion and influencing other populations.
Convention on Cybercrime
Section 1 – Substantive criminal law Title 1 – Offences against the confidentiality, integrity and availability of computer data and systems Article 2 – Illegal access Each Party shall adopt
A Manual for Writers of Research Papers, Theses, and Dissertations: Chicago Style for Students and Researchers
In its eighth edition, "A Manual for Writers of Research Papers, Theses, and Dissertations" has been fully revised to meet the needs of today's writers and researchers.
The Singing Revolution
Reviewed Medium: dvd Year: 2007 Details: with an accompanying book by Priit Vesilind Publisher: Mountain View Productions Prices: $26.95 USD
Recent Events Suggest Cyber Warfare Can Become New Threat (WMD Insights
  • Recent Events Suggest Cyber Warfare Can Become New Threat (WMD Insights
  • 2008
The Information Warfare System: the Mechanism for Foreign Propaganda Requires Renewal, Translated by Open Source Center, (Moscow: Voyenno- Promyshlennyy Kuryer
  • The Information Warfare System: the Mechanism for Foreign Propaganda Requires Renewal, Translated by Open Source Center, (Moscow: Voyenno- Promyshlennyy Kuryer
  • 2008
The Dark Art of Cyberwar (Foreign Policy
  • The Dark Art of Cyberwar (Foreign Policy
  • 2008