Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cyber War-Games

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare
Designed to examine methodology by which an organization responds to realistic simulated cyber crises, enacts and adapts business continuity plans, and whether an organization has appropriate contingency plans, and identifying conditions where an organization is most likely to fail, should an actual event take place. Cyber war-games involve the execution of tabletop exercises and development of potential cyber-threats and countermeasures scenarios.
Published in Chapter:
Mitigating Unconventional Cyber-Warfare: Scenario of Cyber 9/11
Ashok Vaseashta (International Clean Water Institute, USA & Transylvania University of Brasov, Romania & Academy of Sciences of Moldova, Moldova), Sherri B. Vaseashta (Trident Technical College, USA), and Eric W. Braman (Norwich University Applied Research Institutes, USA)
DOI: 10.4018/978-1-4666-8793-6.ch012
Abstract
Advances in S&T coupled with universal access to cyberspace have motivated both state and non-state sponsored actors to new levels in the development of novel and non-traditional modes of attack to coerce, disrupt, or overthrow competing groups, regimes, and governments using unconventional warfare strategies. Threat vectors, caused directly or indirectly are asymmetric, kinetic, and unconventional. Current national and defense strategies in Cyberspace are mostly reactive and defensive, rather than pro-active and offensive. The web-crawlers research innovative ways to target security breaches. Securing critical infrastructure requires a top tier protection. This chapter is focused on ways to understand and combat unconventional warfare in cyber-space from CIS standpoint. This is crucial in avoiding a potential Cyber 9/11. To provide accurate intelligence, surveillance, preparedness and interdiction of such combative postures, ongoing studies of the ways that advance S&T may be employed so as to remain aware, alert and proactive for any/all such contingencies of use, are advocated.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR