Retrouvez les publications de la Chaire Cybersécurité et Cyberdéfense sur le site du CREC-Saint-Cyr.
eConflicts is a blog about cyberconflicts, cyberwar, cyberdefense, cybersecurity, information warfare, cybercrime, political science and international relations
Total Pageviews
Tuesday, September 17, 2013
Monday, September 2, 2013
News - Napolitano urges successor to prepare for cyber attack
"Napolitano urges successor to prepare for cyber attack". Federal Time, August 27, 2013. "Our country will, at some point, face a major cyber event that will have a serious effect on our lives, our economy, and the everyday functioning of our society".
News - U.S. spy agencies mounted 231 offensive cyber-operations in 2011
"U.S. spy agencies mounted 231 offensive cyber-operations in 2011". The Washington Post. August 31, 2013
"Black Budget" of spy agencies" - The Washington Post.
"Of the 231 offensive operations conducted in 2011, the budget said, nearly three-quarters were against top-priority targets, which former officials say includes adversaries such as Iran, Russia, China and North Korea and activities such as nuclear proliferation".
Monday, August 26, 2013
Article - The Cost of Anonymizing a Cybercriminal's Internet Activities - Dancho Danchev
Dancho Danchev proposes an interesting series of 4 articles about "The Cost of Anonymizing a Cybercriminal's Internet Activities" - Dancho Danchev's Blog - August 23, 2013
News - The FBI claims to have neutralized Anonymous
The FBI claims to have neutralized Anonymous - August 26th, 2013 - Security Affairs
Friday, August 23, 2013
Report - The Fog of Cyber Defense - NDU Helsinki
"The Fog of Cyber Defence" - Eds. Jari Rantapelkonen & Mirva Salminen - National Defence University Helsinki - Department of Leadership and Military Pedagogy - 2013 - 236 pages
This book is structured around 3 chapters: Cyberspace, Cybersecurity, Cyber War. The book focuses on Nordic cooperation in the field of defence policy on a political level. Plenty of questions will rise on this research area, such as “Who are the enemies?”; “What are the rules of engagement?”; “Shall we be defensive or offensive in Cyber?”; and “How do we define ‘credible defence’ in cyber?”.
Subscribe to:
Posts (Atom)