Is Cyber Warfare an Alternative?

被引:1
|
作者
Barbosa, Jorge [1 ,2 ]
机构
[1] ISEC, Coimbra Polytech, Coimbra, Portugal
[2] Portuguese Natl Def Inst, Lisbon, Portugal
关键词
Cyber warfare; Cyber weapons; Cyber capability; Zero-day exploits;
D O I
10.1007/978-981-13-9155-2_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The possibility of using computerized means in offensive action against civilian or military installations from enemy countries is a real. Given the potential of this type of action, they can be seen by many countries as interesting, and as an alternative to conventional kinetic warfare. Despite its many theoretical advantages, obtaining the cyber capabilities needed to implement cyber military units is not easy and may not be within reach of any country. The necessary financial means may not be a major obstacle to this achievement because they are relatively low, when compared to those necessary to obtain conventional means. Similarly, obtaining a support infrastructure is also not theoretically difficult. However, obtaining both human and technological resources, other than those related to the support infrastructure, may not be available to any country, namely the designated zero-day exploits, ZDE, that are needed to explore computer vulnerabilities in informatics systems of the other countries. There are other types of constraints, time needed to prepare the means and the planning and development of cyber actions, type of targets to be attained, specificity of computer systems and even the possible need for cyber media complementarity with conventional means that can be limiting and impede their widespread use. Thus, cyber warfare is a very interesting alternative, but given these constraints and limitations, it may not be a real viable alternative to be used in all situations and by all countries.
引用
收藏
页码:65 / 75
页数:11
相关论文
共 50 条
  • [31] Adversary modeling and simulation in cyber warfare
    Hamilton, Samuel N.
    Hamilton, Wendy L.
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 461 - 475
  • [32] The Role of Cultural Intelligence in Cyber Warfare
    Viggiano, Elizabeth
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 415 - 422
  • [33] Cyber warfare and the control systems community
    Lee, Robert M.
    Control (Chicago, Ill), 2011, 24 (12): : 14 - 16
  • [34] Theoretical Examination of the Cyber Warfare Environment
    Lehto, Martti
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 223 - 230
  • [35] Russia's Cyber and Information Warfare
    Akimenko, Valeriy
    Giles, Keir
    ASIA POLICY, 2020, 15 (02): : 67 - 75
  • [36] Net Neutrality in the Context of Cyber Warfare
    Hartmann, Kim
    Giles, Keir
    2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON X): MAXIMISING EFFECTS, 2018, : 139 - 157
  • [37] War and Peace: Cyber Warfare Lessons
    Clark T.
    ITNOW, 2023, 65 (03) : 44 - 45
  • [38] Europe gears up for cyber warfare
    Butterworth-Hayes, Philip
    AEROSPACE AMERICA, 2011, 49 (09) : 4 - 6
  • [39] Cyber Warfare: A Documentary and Reference Guide
    Lothrop, Patricia D.
    LIBRARY JOURNAL, 2020, 145 (11) : 107 - 107
  • [40] Political Warfare: Competition in the Cyber Era
    Nestoras, Antonios
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4427 - 4436