z-logo
open-access-imgOpen Access
Cyber War: Will it define the Limits to IT Security?
Author(s) -
Ingo Ruhman
Publication year - 2013
Publication title -
international review of information ethics
Language(s) - English
Resource type - Journals
ISSN - 2563-5638
DOI - 10.29173/irie156
Subject(s) - computer security , adversary , cyberwarfare , exploit , information warfare , information operations , political science , computer science
Cyber warfare exploits the weaknesses in safety and security of IT systems and infrastructures for political and military purposes. Today, not only have various units in the military and secret services become known to engage in attacks on adversary’s IT systems, but even a number of cyber attacks conducted by these units have been identified. Most cyber warfare doctrines aim at a very broad range of potential adversaries, including civilians and allies, thus justifying the involvement of cyber warfare units in various IT security scenarios of non-military origin. Equating IT security with cyber warfare has serious consequences for the civil information society.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here