2018
DOI: 10.4324/9781315636504
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Cyber Warfare

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Whyte and Mazanec are right to declare that there has been an "unbreakable marriage between computers and espionage" (Whyte and Mazanec 2019: 61), so closely aligned has been the development of the technology with the practice of spying. The origins of the computer itself lie at the heart of the Allied successes in breaching Nazi codes during the Second World War, Enigma the most famous among them (Whyte and Mazanec 2019;Andrew 2018). The sternest challenge to be posed by the technologies that espionage has been "intimately connected" (Lowenthal 2018: 34) with would only truly emerge in the post-Cold War years, when those very technologies challenged the entire infrastructure on which intelligence had been built for decades, the shift from the analog to the digital world.…”
Section: The Transformation: Challenge Fear and Opportunitymentioning
confidence: 99%
“…Whyte and Mazanec are right to declare that there has been an "unbreakable marriage between computers and espionage" (Whyte and Mazanec 2019: 61), so closely aligned has been the development of the technology with the practice of spying. The origins of the computer itself lie at the heart of the Allied successes in breaching Nazi codes during the Second World War, Enigma the most famous among them (Whyte and Mazanec 2019;Andrew 2018). The sternest challenge to be posed by the technologies that espionage has been "intimately connected" (Lowenthal 2018: 34) with would only truly emerge in the post-Cold War years, when those very technologies challenged the entire infrastructure on which intelligence had been built for decades, the shift from the analog to the digital world.…”
Section: The Transformation: Challenge Fear and Opportunitymentioning
confidence: 99%
“…The idea of cyber-security came in accordance with the concept of cyber-attacks and piracy, which appeared on the internet, resembling itself as a ghost that threatens online data and information, in addition to risking the security of transactions that take place online (Whyte & Mazanec, 2018). Priyadarshini (2018) argued that cyber-security is considered to be an important pillar of information security not only at the organization-al level but also at the level of countries, as it includes e-government security.…”
Section: Literature Reviewmentioning
confidence: 99%