Search: Cyber-attacks (2 materials)

It’s Hard to Find a Black Cat in a Dark Room, Especially If It Isn’t There. RAND on the Search for Cyber Coercion

... inferred from practice) and claim that demands and threats expressed as part of such coercion are sometimes ambiguous, as identification of the threatening party can be. But what remains of coercion if its defining characteristics are removed? Large-scale cyber-attacks are not just a show of force but achievement of specific objectives, so they have nothing to do with coercion . The above seems to challenge the accuracy of the question asked at the beginning of the paper under review: “What is cyber ...

19.11.2019

Nuclear-Cybernetic Systems

... talking about the networks that are directly related to nuclear weapons and to the country’s survival (as per the modern approach to defining the role of nuclear weapons). The possible emergence of automated retaliatory strike systems triggered by cyber-attacks poses a separate threat, although any protection against an attack in cyberspace is, by default, of an active nature. In addition, in the past, the Pentagon confirmed its readiness to deliver pre-launch cyber-attacks on enemy missiles as ...

25.07.2017
For business
For researchers
For students