Descriptors
Documents disponibles dans cette catégorie (7)
Article : Articles
PIJPERS, Peter, Author |De oorlog in Oekraïne laat zien dat de ingezette cybermiddelen niet zozeer strategische effecten creëren, maar wel militaire of politieke campagnes ondersteunen. Volgens Peter Pijpers en Kraesten Arnold zijn het vaak niet-statelijke actoren di[...]
Article on page: p.35-40 Descriptors: 5.05 Information sciences > Computer science > Cyberespace
6.20 International relations > State security > Sécurité nationale > Cyberdéfense
Languages: Dutch Articles
Lennart Maschmeyer, Author | 2023The Russian-sponsored influence campaign targeting the 2016 US Presidential Elections surprised policy-makers and scholars, highlighting a gap in theories of (cyber) power. Russia had used information technologies to project p[...]
ISBN (or other code): 10.1177/13540661221117051 Article on page: 25p. Descriptors: Languages: English Source du document : European Journal of International Relations, 2023, Vol. 29(1), pp.79-103 Article : Articles
Catherine Vuylsteke, Author |China heeft de grootste digitale surveillancestaat ter wereld uitgebouwd. Hoe houdt de Chinese overheid de burgers in de pas? 'Met de illusie van allesomvattend toezicht', zegt Josh Shin.
Article on page: 6p. Descriptors: Languages: Dutch Article : Articles
Critical Infrastructure (CI) is an area that has historically been rife with vulnerabilities, open to foreign and domestic threats. Recent events such as the Colonial Pipeline and JBS Foods provider ransomware attacks highlight the need for be[...]
Article on page: 12p. Descriptors: 5.05 Information sciences > Computer science > Cyberespace
6.20 International relations > State security > Sécurité nationale > Cyberdéfense
Tags: Critical Infrastructure ; Information Warfare ; Cyber Warfare ; Electronic Warfare ; Information Environment Languages: English Article : Articles
M. ARIK, Author |Preparation of cyberspace operations (COs) requires planners to consider technical peculiarities, which are not relevant in terms of planning traditional military operations (Barber, Bobo & Sturm 2015). Using Exercise Crossed Swords 2021 as an[...]
Article on page: 12p. Descriptors: Languages: English Article : Articles
The Ambidextrous Framework for Offensive Cyberspace Operations is validated using a simulated cyber conflict emulating a cyber operation against critical infrastructure of a fictitious country. The purpose is to assess how well the framework sup[...]
Article on page: 17p. Descriptors: Tags: Offensive Cyberspace Operations ; Cyber Range and Training Environment (CRATE) Languages: English Books
ISBN (or other code): 9798675589012 Article on page: 196 p. Descriptors: 2.60 Pollution, disasters and safety > Safety > Safety measures
5.05 Information sciences > Computer science
5.05 Information sciences > Computer science > Cyberespace
6.20 International relations > State security > International security
Class number: 005.8 Tags: Computer security ; Cyberterrorism--Prevention ; Computer networks--Security measures ; Information warfare--Prevention ; United States ; Cyberspace operations (Military science) ; Cyberspace--Security measures Languages: English