Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyber Warfare

Analyzing New Forms of Social Disorders in Modern Virtual Environments
The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Published in Chapter:
Basic Principles of Information and Cyber Security
Nika Chitadze (International Black Sea University, Georgia)
DOI: 10.4018/978-1-6684-5760-3.ch009
Abstract
Cybercrime is any illegal act committed using a computer system in cyberspace. Along with rapid technological progress in the 21st century, the number of cyber risks is increasing significantly. In modern times, quite common cases of cybercrime are online fraud, unauthorized access to a computer system, online child pornography, unauthorized use of computer systems and data, etc. As for information security, it includes the following components: 1) protection of information, services, systems, and telecommunications in any form and 2) protection (maintenance) of confidentiality, integrity (integrity), and availability of information. Information security includes technical security, actions of individuals, organizational procedures, and social conditions. Threats to information security include breaches of personal privacy, e-mail “spam” (junk, advertising e-mail), industrial espionage, piracy, computer viruses, cyber-terrorism, and electronic warfare. Any of the above threats can spread across the world in a second via information networks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
China's Cyber Security Policy and the Democratic World
Is usually defined as a cyber-attack or series of attacks that target a country. It has the potential to wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in damage to the state and even loss of life.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Security: Cyber Risk Challenges for Future Leaders and Businesses
Using digital hacking tools and viruses with military units that are specially educated and trained to use them in an effort to disrupt or destroy another country’s or nation’s infrastructure.
Full Text Chapter Download: US $37.50 Add to Cart
Cybercrimes Technologies and Approaches
Utilizes cyber mediums, such as Internet or telecommunication lines, as weapons to brutally destroy enemies’ critical infrastructures, such as power plants.
Full Text Chapter Download: US $37.50 Add to Cart
A Geo-Political Analysis
Use of sophisticated tools, techniques and tactics to actively interfere with or deliver a desired effect against computerized systems by abusing the electromagnetic spectrum or computer networks in order to manipulate or deny an opponent’s use of digital data capabilities.
Full Text Chapter Download: US $37.50 Add to Cart
Origin of Cyber Warfare and How the Espionage Changed: A Historical Overview
They are all those activities aimed at causing damage to computer systems of any kind. Unlike “normal” cyber attacks, these are actions carried out with specific political-military purposes by special military apparatus or by cyber criminal organizations financed, in any case, by government entities.
Full Text Chapter Download: US $37.50 Add to Cart
The Main Historical Stages of the Development of Cyber Space
Involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. RAND research provides recommendations to military and civilian decision-makers on methods of defending against the damaging effects of cyber warfare on a nation's digital infrastructure.
Full Text Chapter Download: US $37.50 Add to Cart
The Role and Place of Cyber Warfare and Cyber Security in the World: Past, Present, Future
The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Wars and Cyber Threats Against Mobile Devices: Analysis of Mobile Devices
A set of actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks.
Full Text Chapter Download: US $37.50 Add to Cart
Trends in Peace Research: Can Cyber Détente Lead to Lasting Peace?
Continuing conflict of national armies or guerrilla groups in cyber space, which includes attacking opponent's information infrastructure, using malware or other cyber tools and techniques, as well as the implementation of promotional activities, aimed at harming the enemy and weakening its defense capabilities in cyber space and the physical world.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR