Cyber Weapons and Cyber Warfare
暂无分享,去创建一个
A cyber attack is any type of offensive action employed by nation-states, individuals, groups, or organizations that targets computer information systems, infrastructures, computer networks, or personal computer devices by various means of malicious acts. Cyber attacks typically originate from an anonymous source that steals, alters, or destroys a specified target by hacking into a vulnerable system (https://en.wikipedia.org/wiki/Cyberattack). Cyber warfare involves the actions by a nation-state to attack and attempt to damage another nation’s computers or information infrastructure through, for example, computer viruses, worms, or denial-of-service attacks. In this chapter we’ll look at various types of cryptologic techniques used in cyber attacks and discuss the possibilities of using cryptology in cyber warfare; the chapter does not go deeply into system vulnerabilities and attacks or into cyber attack prevention, mitigation, or response.
[1] Hassen Saïdi,et al. A Foray into Conficker's Logic and Rendezvous Points , 2009, LEET.
[2] Katie Hafner,et al. Cyberpunk: Outlaws and Hackers on the Computer Frontier , 1991 .
[3] Simon Singh,et al. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography , 1999 .
[4] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[5] Kevin D. Mitnick,et al. Ghost In The Wires: My Adventures as the World's Most Wanted Hacker , 2011 .