Reference Hub3
Cyberwarfare: War Activities in Cyberspace

Cyberwarfare: War Activities in Cyberspace

Caner Asbaş, Şule Erdem Tuzlukaya
Copyright: © 2023 |Pages: 18
ISBN13: 9781668467411|ISBN10: 1668467410|EISBN13: 9781668467428
DOI: 10.4018/978-1-6684-6741-1.ch007
Cite Chapter Cite Chapter

MLA

Asbaş, Caner, and Şule Erdem Tuzlukaya. "Cyberwarfare: War Activities in Cyberspace." Handbook of Research on War Policies, Strategies, and Cyber Wars, edited by Fahri Özsungur, IGI Global, 2023, pp. 128-145. https://doi.org/10.4018/978-1-6684-6741-1.ch007

APA

Asbaş, C. & Erdem Tuzlukaya, Ş. (2023). Cyberwarfare: War Activities in Cyberspace. In F. Özsungur (Ed.), Handbook of Research on War Policies, Strategies, and Cyber Wars (pp. 128-145). IGI Global. https://doi.org/10.4018/978-1-6684-6741-1.ch007

Chicago

Asbaş, Caner, and Şule Erdem Tuzlukaya. "Cyberwarfare: War Activities in Cyberspace." In Handbook of Research on War Policies, Strategies, and Cyber Wars, edited by Fahri Özsungur, 128-145. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6741-1.ch007

Export Reference

Mendeley
Favorite

Abstract

With today's changes in war doctrines, the areas where war is undertaken are highly diversified, in addition to the traditional land, air and, sea classifications. One of these areas is cyberspace, where all the activities are waged in this field by exploiting the advantages such as accessibility, availability, cheapness, convenience, anonymity, independence from distance and defense – attack asymmetry called cyberwarfare. Cyberwarfare is the use of cyberattacks by a state or an organization to cause harm to another state's or organization's computer information systems, computer networks and computer infrastructures in the context of warfare. The rationale behind these objectives is similar to other types of warfare, as cyberwarfare is both a dimension of actual warfare and stand-alone war area. In this chapter, cyberwarfare and related phenomena will be extensively discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.