首页> 外文学位 >Cyber warfare as a form of conflict: Evaluation of models of cyber conflict as a prototype to conceptual analysis.
【24h】

Cyber warfare as a form of conflict: Evaluation of models of cyber conflict as a prototype to conceptual analysis.

机译:网络战争是冲突的一种形式:将网络冲突模型的评估作为概念分析的原型。

获取原文
获取原文并翻译 | 示例

摘要

In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a grave yard from the center of town (Evron, 2008, p. 122). The cyber riot was nearly simultaneous with the actual real world riots. This brought the idea of cyber warfare and conflict in cyberspace into the public view.;It may be better to replace the idea of asymmetric threats with the idea of strategic threats as the threat may not be asymmetric (e.g. large scale cyber warfare) but the adversary's strategy is asymmetric in effort. If according to Clausewitz, we are willing to accept that there are two primary things needed for war (politically opposed will-power and the ability to field a military) then a missing element of cyber warfare may be the ability to field a military (Szafranski, 1990, p. 39).;This research states, "Given the unstructured domain of cyber warfare knowledge a specific model will allow experts to produce a concept map significantly more detailed than absent the model." Experts were solicited in a variety of venues to map cyber warfare using a concept mapping process and provide a deeper understanding of the concept. Two technology-centric models were given to groups of experts to assist them in explaining elements of cyber conflict. One group was just given the cyber warfare question and no specific model as guidance. The groups were then compared to see if either of the models had better explanatory power per the experts responses.
机译:2007年4月,被错误地称为第一次网络战争,此后更正确地称为网络骚乱,对爱沙尼亚的域名系统和各种服务器进行了攻击。它是由居住在爱沙尼亚的俄罗斯族人犯下的,这些人为将青铜色的战争纪念馆移动到从镇中心到墓地的行为而感到愤怒(Evron,2008,p。122)。网络骚乱与现实世界中的骚乱几乎同时发生。这将网络战争和网络空间冲突的观念带入了公众视野。最好用战略威胁的观念代替不对称威胁的观念,因为威胁可能不是不对称的(例如大规模网络战争),但是对手的策略在努力上是不对称的。如果按照克劳塞维茨的说法,我们愿意接受战争需要两个主要条件(政治上反对的意志力和部署军队的能力),那么网络战争中缺少的要素可能就是部署军队的能力(Szafranski ,1990年,第39页)。该研究指出:“鉴于网络战知识的非结构化领域,特定模型将使专家能够制作出比没有模型时更为详细的概念图。”在各个场所均邀请专家使用概念映射过程对网络战进行映射,并提供对该概念的更深刻理解。为专家组提供了两个以技术为中心的模型,以帮助他们解释网络冲突的要素。仅向一组人提出网​​络战问题,而没有特定的模型作为指导。然后将各组进行比较,以根据专家的回答看这两个模型是否具有更好的解释力。

著录项

  • 作者

    Liles, Samuel P., III.;

  • 作者单位

    Purdue University.;

  • 授予单位 Purdue University.;
  • 学科 Information Technology.;Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 125 p.
  • 总页数 125
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:43:35

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号