Is Cyber Warfare an Alternative?

被引:1
|
作者
Barbosa, Jorge [1 ,2 ]
机构
[1] ISEC, Coimbra Polytech, Coimbra, Portugal
[2] Portuguese Natl Def Inst, Lisbon, Portugal
关键词
Cyber warfare; Cyber weapons; Cyber capability; Zero-day exploits;
D O I
10.1007/978-981-13-9155-2_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The possibility of using computerized means in offensive action against civilian or military installations from enemy countries is a real. Given the potential of this type of action, they can be seen by many countries as interesting, and as an alternative to conventional kinetic warfare. Despite its many theoretical advantages, obtaining the cyber capabilities needed to implement cyber military units is not easy and may not be within reach of any country. The necessary financial means may not be a major obstacle to this achievement because they are relatively low, when compared to those necessary to obtain conventional means. Similarly, obtaining a support infrastructure is also not theoretically difficult. However, obtaining both human and technological resources, other than those related to the support infrastructure, may not be available to any country, namely the designated zero-day exploits, ZDE, that are needed to explore computer vulnerabilities in informatics systems of the other countries. There are other types of constraints, time needed to prepare the means and the planning and development of cyber actions, type of targets to be attained, specificity of computer systems and even the possible need for cyber media complementarity with conventional means that can be limiting and impede their widespread use. Thus, cyber warfare is a very interesting alternative, but given these constraints and limitations, it may not be a real viable alternative to be used in all situations and by all countries.
引用
收藏
页码:65 / 75
页数:11
相关论文
共 50 条
  • [1] CYBER WARFARE
    Solis, Gary D.
    MILITARY LAW REVIEW, 2014, 219 : 1 - 52
  • [2] Cyber Warfare and Electronic Warfare Integration in the operational environment of the future: Cyber Electronic Warfare
    Askin, Osman
    Irmak, Riza
    Avsever, Mustafa
    CYBER SENSING 2015, 2015, 9458
  • [3] Cyber Alliances and Proxy Cyber Warfare
    Barbosa, Jorge
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 33 - 38
  • [4] Inside cyber warfare
    Zotti, Alexander
    GLOBAL CHANGE PEACE & SECURITY, 2011, 23 (03) : 437 - 438
  • [5] Encyclopedia of Cyber Warfare
    Davis, Evan
    REFERENCE & USER SERVICES QUARTERLY, 2018, 57 (03) : 225 - 225
  • [6] Ethics of cyber warfare
    Altmann, Juergen
    Vidal, Francesca
    INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2013, 20 : 2 - 3
  • [7] Cyber warfare peacekeeping
    Cahill, TP
    Rozinov, K
    Mulé, C
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 100 - 107
  • [8] Cyber Defence and Warfare
    Ball, Desmond
    Waters, Gary
    SECURITY CHALLENGES, 2013, 9 (02) : 91 - 98
  • [9] Cyber Threats and Cyber Deception in Hybrid Warfare
    Steingartner, William
    Galinec, Darko
    ACTA POLYTECHNICA HUNGARICA, 2021, 18 (03) : 25 - 45
  • [10] Inside Cyber Warfare, Mapping the Cyber Underworld
    Marks, Larry
    INFORMATION SECURITY JOURNAL, 2013, 22 (04): : 201 - +