Difference between revisions of "The future of cyber-warfare 2020"
Jump to navigation
Jump to search
Line 33: | Line 33: | ||
#[[How complex can the Internet be?]]<br> | #[[How complex can the Internet be?]]<br> | ||
-Stef<br> | -Stef<br> | ||
#[[What is the key recommendation of the National Strategy(US) to Secure Cyberspace | #[[What is malware?]]<br> | ||
#[[What is the key recommendation of the National Strategy(US) to Secure Cyberspace?]]<br> | |||
#[[What is a trojan horse?]]<br> | #[[What is a trojan horse?]]<br> | ||
#[[What is virus?]]<br> | #[[What is virus?]]<br> |
Revision as of 17:39, 25 April 2008
Group Members
Giorgos Valaouras
Stefan Zhelyazkov
Zoran Milkovski
Stef Cobelens
Bjorn Warsosemito
Resources
http://www.nato.int/docu/review/2001/0104-04.htm
http://staff.washington.edu/dittrich/cyberwarfare.html
http://www.wired.com/search?query=cyber+warfare&siteAlias=all&x=292&y=24
Questions
- George
- What is the Internet backbone?
- What is the Internet 2?
- What are the demographics of the Internet?
- What are the most common ways of accessing the Internet?
- What is the e-government?
- What is a virtual community?
- What are government databases?
- What is mass surveillance?
- What is hacktivism?
- What is cyber-terrorism?
- What is malicious software?
- What is e-money?
- What is data privacy?
- What is Internet censorship?
- What is Internet activism?
- What is a data spill?
- What kind of devices can be connected to the Internet?
- What are the limitations or vulnerabilities of the Internet?
- Which major events of cyber-warefare/cyber-terrorism have happened in the past?
- How complex can the Internet be?
-Stef
- What is malware?
- What is the key recommendation of the National Strategy(US) to Secure Cyberspace?
- What is a trojan horse?
- What is virus?
- What is warfare?
- What is Cyber-space?
- What is Information warfare?
- What are the standard preventive security measures against a cyber attack?
- What is Cyber-crime?
- What kind of damage can a cyber-attack do?
- Which kind people are involved in cyber-warfare?
- What are the three aspects of security?
- What is a firewall?
- What is a botnet?
- What is a DDoS attack?
-Zoran
- Cyber warfare, crime, terrorism or full-scale war?
- Can cyber warfare have serious consequences like the Manhattan project or 9/11?
- Vigilantes in the Cyberspace?
- Government plans for cyber warfare (defensive and offensive strategy)?
- Shifts in battlefields locations?
- Spies in the cyberspace?
- Cyber warfare as a propaganda machine?
- Motivated cyber riots?
- Privately vs. Government vs. Individual attacks?
- Possibility for systematically targeted attacks in disabling a whole country?
- How does cyber warfare affect the physical world today?
- What is the human factor in cyber warfare?
- Can the computers actually win a war?
- Information revolution as the main cause behind shift in battlefield?
- John Arquilla and David Ronfeldt’s distinction between Netwar and Cyberwar?
- Tools and benefits required for cyberspace domination?
- Cyberwar, next logical step in military doctrine?
- Extensive cyber attack and the psychological consequences?
- Time constraints in an effective cyber attack?
- Liability laws as protection for the target of an attack?
-Stefan
- What are the different categories of cyber warfare?
- Who are the big players now?
- Who are the emerging players?
- Which are the leading research institutes for cyber warfare technologies?
- Current trends of cyber weapons development?
- Official policies for cyber warefare and budgets?
- Hotzones and current cyber warfare conflicts?
- What are the legislations for cyber warfare?
- Are there any international treaties regarding cyber warfare?
- How cyber warfare is recognized by international bodies?
- When and how cyber warfare started?
- Costs of cyber warfare?
- Differences b/n cyber and conventional warfare?
- Does cyber warfare can change the odds in a potential conflict?
- How cyber warfare is integrated in military way of thought?
- What are the actions the US government is taking in terms of cyber warfare?