温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.eb.com/topic/cyberwar
点击访问原文链接

Cyberwar | Cybersecurity, Cyberattacks & Defense Strategies | Britannica

SUBSCRIBESUBSCRIBESUBSCRIBEHomeHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyGames & QuizzesVideosOn This DayOne Good FactDictionaryNew ArticlesHistory & SocietyLifestyles & Social IssuesPhilosophy & ReligionPolitics, Law & GovernmentWorld HistoryScience & TechHealth & MedicineScienceTechnologyBiographiesBrowse BiographiesAnimals & NatureBirds, Reptiles & Other VertebratesEnvironmentFossils & Geologic TimeInsects & Other InvertebratesMammalsPlantsGeography & TravelGeography & TravelArts & CultureEntertainment & Pop CultureLiteratureSports & RecreationVisual ArtsImage GalleriesPodcastsSummariesTop QuestionsLists and StoriesBritannica KidsAsk the ChatbotGames & QuizzesHistory & SocietyScience & TechBiographiesAnimals & NatureGeography & TravelArts & CultureProConMoneyVideoscyberwarIntroductionAttacks in cyberspaceCybercrime, cyberespionage, or cyberwar?Cyberattack and cyberdefenseReferences & Edit HistoryQuick Facts & Related TopicsImagesA History of WarWorld HistoryWars, Battles & Armed ConflictsFacebookXhttps://www.britannica.com/topic/cyberwarFederation of American Scientists - Cyberwarfare and Cyberterrorism: In BriefFederation of American Scientists - Cyberwarfare and Cyberterrorism: In BriefComputer Hope - CyberwarJohn B. Sheldon Professor of space security and cybersecurity, School of Advanced Air and Space Studies, Maxwell Air Force Base, Ala., U.S. Dr. Sheldon holds BA (Honors) and MA degrees from the University of Hull, UK,...Britannica Editors Encyclopaedia Britannica's editors oversee subject areas in which they have extensive knowledge, whether from years of experience gained by working on that content or via study for an advanced degree....HistoryBarksdale Air Force BasewarcomputersnetworksproxiesmilitarycybercrimetacticsconstitutecyberspaceinfrastructuresRAND CorporationsatellitessoftwarevulnerableinfrastructureNATOoperation against Iraqmalwaremaliciousvirusestrojansspywarewormsdenial-of-service“zombie” computersallegedBritannica Quiz A History of Warphishinginnocuouslegitimatecomputer systemWeb siteflash memoryMiddle Eastdataintelligenceespionagecomputer securitycrimeterrorismwarimplicationsUnited StatesfacilitateHamasHezbollahair traffic controlattributionSUBSCRIBE Some experts specializing in the laws of armed conflict question the notion that hostile cyberactivities can cause war (though they are more certain about the use of hostile cyberactivities during war). They argue that such activities and techniques do not constitute a new kind of warfare but simply are used as a prelude to, and in conjunction with, traditional methods of warfare. Indeed, in recent years cyberwar has assumed a prominent role in armed conflicts, ranging from the Israeli-Hezbollah conflict in Lebanon in 2006 to the Russian invasion of Georgia in 2008. In these cases cyberattacks were launched by all belligerentsEstoniacontextTallinnwarcyberspaceadvanced persistent threatcyberespionagecyberdefenseSee all related content

智能索引记录