Current and Emerging Trends in Cyber Operations
DOI: 10.1057/9781137455550.0006
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Conflict

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…47 Even air-gapped systems could be vulnerable to cyber attacks, and thus be considered as part of the cyber domain. 48 Moreover, in regard to the information layer, it would be crucial to distinguish between code and content of information. The latter often points to the perceptual aspect of human brain.…”
Section: Boundary Of Cyber Securitymentioning
confidence: 99%
“…47 Even air-gapped systems could be vulnerable to cyber attacks, and thus be considered as part of the cyber domain. 48 Moreover, in regard to the information layer, it would be crucial to distinguish between code and content of information. The latter often points to the perceptual aspect of human brain.…”
Section: Boundary Of Cyber Securitymentioning
confidence: 99%
“…Even if so, was it the work of an isolated individual, or the work of a terrorist group, or an attack by another nation state? As pointed out byApplegate and Stavrou (2013), cyber conflict, rather than cyberwar may be involved, that is, rather than one nation state attacking another, it could be an attack by non-state actors, whose actions are politically motivated. Rapid response to defend South Africa, rather than rapid response to retaliate is thus an appropriate focus of the RSA policy.…”
mentioning
confidence: 99%