User contributions for Zoran
Jump to navigation
Jump to search
- 02:20, 19 May 2008 diff hist −1 Cyberspace domination →Inhibitors: current
- 02:18, 19 May 2008 diff hist +41 The issue of critical systems coming online →Web Links: current
- 02:15, 19 May 2008 diff hist +884 The issue of critical systems coming online →Inhibitors:
- 02:09, 19 May 2008 diff hist +1,045 The issue of critical systems coming online →Enablers:
- 02:01, 19 May 2008 diff hist +1,793 The issue of critical systems coming online →Description:
- 01:55, 19 May 2008 diff hist +87 The issue of critical systems coming online →Web Links:
- 01:04, 19 May 2008 diff hist −1 The issue of critical systems coming online →Inhibitors:
- 01:01, 19 May 2008 diff hist +84 The issue of critical systems coming online →Web Links:
- 01:00, 19 May 2008 diff hist +108 The issue of critical systems coming online →Web Links:
- 01:00, 19 May 2008 diff hist +152 The issue of critical systems coming online →Enablers:
- 00:57, 19 May 2008 diff hist +181 The issue of critical systems coming online →Inhibitors:
- 00:56, 19 May 2008 diff hist +3 The issue of critical systems coming online →Web Links:
- 00:56, 19 May 2008 diff hist −7 The issue of critical systems coming online →Web Links:
- 00:55, 19 May 2008 diff hist +8 The issue of critical systems coming online →Web Links:
- 00:54, 19 May 2008 diff hist +16 The issue of critical systems coming online
- 00:53, 19 May 2008 diff hist +1,086 The issue of critical systems coming online
- 00:47, 19 May 2008 diff hist +17 The issue of critical systems coming online
- 00:47, 19 May 2008 diff hist +48 N The issue of critical systems coming online New page: ==Description:== ==Enablers:== ==Inhibitors:==
- 00:45, 19 May 2008 diff hist +17 Cyberspace domination
- 22:31, 18 May 2008 diff hist +62 Cyberspace domination →Web Links:
- 22:15, 18 May 2008 diff hist +119 Cyberspace domination
- 22:13, 18 May 2008 diff hist +20 Cyberspace domination →Time:
- 22:12, 18 May 2008 diff hist +205 Cyberspace domination
- 21:57, 18 May 2008 diff hist +28 Cyberspace domination →Paradigms:
- 21:57, 18 May 2008 diff hist +250 Cyberspace domination →Paradigms:
- 21:56, 18 May 2008 diff hist +1,177 Cyberspace domination →Inhibitors:
- 21:53, 18 May 2008 diff hist +1,359 Cyberspace domination →Enablers:
- 21:51, 18 May 2008 diff hist +1,429 Cyberspace domination →Description:
- 21:49, 18 May 2008 diff hist −12 Cyberspace domination →Description:
- 21:48, 18 May 2008 diff hist −1 Cyberspace domination →Description:
- 21:48, 18 May 2008 diff hist +12 Cyberspace domination →Description:
- 21:47, 18 May 2008 diff hist +13 m Cyberspace domination →Description:
- 21:47, 18 May 2008 diff hist +670 N Cyberspace domination New page: ==Description:== When the Internet rolled out in the early 1990 by the American scientists many professionals thought that it would just be another way of America to push its products and ...
- 21:38, 18 May 2008 diff hist +46 The future of cyber-warfare 2020 →Driving forces
- 15:15, 12 May 2008 diff hist +26 N Towards E-business economy New page: ==Author== Zoran Milkovski current
- 15:15, 12 May 2008 diff hist +36 The future of cyber-warfare 2020 →Driving forces
- 15:13, 12 May 2008 diff hist +102 Cyberspace domain control →Author current
- 15:12, 12 May 2008 diff hist +10 N Cyberspace domain control New page: ==Author==
- 15:09, 12 May 2008 diff hist +35 The future of cyber-warfare 2020 →Driving forces
- 14:13, 25 April 2008 diff hist +12 The future of cyber-warfare 2020 →Questions
- 13:55, 25 April 2008 diff hist +267 Time constraints in an effective cyber attack? current
- 13:48, 25 April 2008 diff hist +696 N Liability laws as protection for the target of an attack? New page: One important thing that every business wants is insurance and liability. In case something happens like equipment failure or hacker attack due to a vulnerability of the software, people w... current
- 13:47, 25 April 2008 diff hist +737 N Time constraints in an effective cyber attack? New page: The Slammer worm, also known as the Sapphire worm, hit at 5:30 a.m. GMT on Jan. 25, 2003 -- Superbowl weekend. Exploiting a vulnerability in servers running Microsoft SQL Server 2000 softw...
- 13:47, 25 April 2008 diff hist +1,208 N Extensive cyber attack and the psychological consequences? New page: One often raised question when talking about cyber attacks is what can possibly the damage be. Many people often argument using examples as commercial ventures such as Amazon on Ebay, argu... current
- 13:47, 25 April 2008 diff hist +1,038 N Cyberwar, next logical step in military doctrine? New page: What was accepted before WW I was that in order to defeat someone, you have to defeat the army, which amounted in severe population decrease and exhaustions. In WW I this became apparent m... current
- 13:46, 25 April 2008 diff hist +806 N Tools and benefits required for cyberspace domination? New page: Cyberwar depends less on the geographic terrain than on the nature of the electronic “cyberspace,” which should be open to domination through advanced technology applications. Cyberwar... current
- 13:46, 25 April 2008 diff hist +862 N John Arquilla and David Ronfeldt’s distinction between Netwar and Cyberwar? New page: Netwar refers to information-related conflict at a grand level between nations or societies. It means trying to disrupt, damage, or modify what a target population “knows” or thinks it... current
- 13:45, 25 April 2008 diff hist +885 N Information revolution as the main cause behind shift in battlefield? New page: Wars have always been largely dependent on resources and know-how. Industry, agriculture, access to sea, geographical position and etc. have played important parts in waging wars as pillar... current
- 13:45, 25 April 2008 diff hist +480 The future of cyber-warfare 2020 →Questions
- 02:10, 25 April 2008 diff hist +522 N Can the computers actually win a war? New page: A study produced for the “Center for Strategic and International studies” by Jim Lewis, a 16-year veteran of the State and Commerce Departments states that even though online attacks s... current
- 02:09, 25 April 2008 diff hist +448 N What is the human factor in cyber warfare? New page: Every time an anonymous hacker or some security expert gives an interview, they inevitably mention “social engineering” and human error as most important factors in systems intrusion. ... current
- 02:09, 25 April 2008 diff hist +906 N How does cyber warfare affect the physical world today? New page: Even though cyber warfare is a very popular topic, and many attacks have been conducted that made both commercial enterprises and governments spend a lot of money. However, many experts ar... current
- 02:07, 25 April 2008 diff hist +164 The future of cyber-warfare 2020 →Questions
- 20:10, 21 April 2008 diff hist +680 N Possibility for systematically targeted attacks in disabling a whole country? New page: The concept of disabling the whole country by initiating cyber attacks first appeared in an article called ''''' “A Farewell to Arms” ''''' by a Wired magazine written John Carlin in ...
- 19:59, 21 April 2008 diff hist +494 N Privately vs. Government vs. Individual attacks? New page: Although, this question can be inferred from the previous ones, we have to consider is separately because it is very important in determining the complexity, might and motivation behind ea...
- 19:48, 21 April 2008 diff hist +608 N Motivated cyber riots? New page: Cyber riot is a newly coined term, which became famous since the “Estonian cyber war”, which most people interpret as a riot rather than war.<br> This is so mainly because of the motiv...
- 19:41, 21 April 2008 diff hist +478 N Cyber warfare as a propaganda machine? New page: Since the very beginning website have been defaced and propaganda content displayed. Famous attacks are the attack on the Church of Scientology, the attack on Kyrgyzstan during the electi...
- 19:35, 21 April 2008 diff hist +1,145 N Spies in the cyberspace? New page: Spying, or information gathering of confidential information, which means that the holder of the information does not give a permission to be shared has played in important role in gainin...
- 19:24, 21 April 2008 diff hist +793 N Shifts in battlefields locations? New page: Cyberspace was a term originally coined by a science fiction novelist William Gibson and is accepted today as an electronics domain where data exchange is made on networked systems. And a...
- 19:08, 21 April 2008 diff hist +1,050 N Vigilantes in the Cyberspace? New page: In 1998, a group called Electronic Disturbance Theater launched DDoS attack on pentagon computers, to which Pentagon responded by redirecting the requests to a Java applet programmed to is...
- 18:51, 21 April 2008 diff hist +2,079 N Cyber warfare, crime, terrorism or full-scale war? New page: Although cyber warfare alludes to violent conflicts in cyberspace, we have to explore the extent and by that, we have to distinguish between several different types of violent behavior tha...
- 18:30, 21 April 2008 diff hist −5 Government plans for cyber warfare (defensive and offensive strategy)?
- 18:30, 21 April 2008 diff hist +18 Government plans for cyber warfare (defensive and offensive strategy)?
- 17:18, 21 April 2008 diff hist 0 Government plans for cyber warfare (defensive and offensive strategy)?
- 17:18, 21 April 2008 diff hist +26 Government plans for cyber warfare (defensive and offensive strategy)?
- 16:24, 21 April 2008 diff hist +2,443 Government plans for cyber warfare (defensive and offensive strategy)?
- 16:23, 21 April 2008 diff hist −2,452 Government plans for cyber warfare (defensive and offensive strategy)? Removing all content from page
- 16:23, 21 April 2008 diff hist −12 Government plans for cyber warfare (defensive and offensive strategy)?
- 16:22, 21 April 2008 diff hist −17 Government plans for cyber warfare (defensive and offensive strategy)?
- 16:21, 21 April 2008 diff hist +4 Government plans for cyber warfare (defensive and offensive strategy)?
- 16:20, 21 April 2008 diff hist +2,477 N Government plans for cyber warfare (defensive and offensive strategy)? New page: Excerpt form ''' “China’s cyber army is preparing to march on America, says Pentagon” ''' published by The Times in September 2007 Chinese military hackers have prepared a detailed p...
- 15:53, 21 April 2008 diff hist +4 Can cyber warfare have serious consequences like the Manhattan project or 9/11?
- 15:53, 21 April 2008 diff hist +8 Can cyber warfare have serious consequences like the Manhattan project or 9/11?
- 15:51, 21 April 2008 diff hist +5 Can cyber warfare have serious consequences like the Manhattan project or 9/11?
- 15:49, 21 April 2008 diff hist +1,369 N Can cyber warfare have serious consequences like the Manhattan project or 9/11? New page: On April 10, 2008 the Homeland Security Secretary Michael Chertoff came up with a speech on the RSA security conference in San Fransciso that there is a threat of having a cyber attack of ...
- 15:01, 21 April 2008 diff hist 0 The future of cyber-warfare 2020 →Questions
- 15:01, 21 April 2008 diff hist +40 The future of cyber-warfare 2020 →Questions
- 23:38, 20 April 2008 diff hist 0 The future of cyber-warfare 2020 →Questions
- 23:33, 20 April 2008 diff hist 0 The future of cyber-warfare 2020 →Questions
- 23:32, 20 April 2008 diff hist +40 The future of cyber-warfare 2020 →Questions
- 23:31, 20 April 2008 diff hist +531 The future of cyber-warfare 2020 →Questions