首页> 外文会议>International Conference on Cyber Warfare and Security >Cyber Warfare: Can there be Small Cyber Military Powers?
【24h】

Cyber Warfare: Can there be Small Cyber Military Powers?

机译:网络战争:可以有小的网络军事力量吗?

获取原文

摘要

The potential that cyber warfare seems to have, and the low economic costs required to implement a cyber army, when compared to the acquisition of means used in conventional warfare, can lead to the massive appearance of the first ones. This may also lead small countries to want to become "Cyber Military Powers", although they may not have the conditions, namely economic, to be "Conventional Military Powers" (A. Caldas, 2013; Barbosa, 2018). There are some difficulties, which, however, they would have to overcome in order for it to be possible for them. The human resources necessary for the constitution of a cyber army are very different from those necessary for the constitution of a conventional army. The physical and athletic capacity of cyber troops is important, but intellectual and scientific capacity is fundamental. The knowledge and mastery of computer technology in its various subareas: software, hardware, programming, networks, databases, etc. must be of an excellent level. Obtaining these capabilities takes a long time and may not be possible for anyone to acquire. The propensity for information technology is fundamental, since the capacities and computer skills have much of innate. There are many kinds of cyberwar actions but we consider the Cyberwarfare actions based in the exploiting of computer bugs, and, which may lead to the so-called loss of state sovereignty. In this cases, preferably, these bugs, vulnerabilities, should be unknown, Zero Day Vulnerability, ZDV. To exploit these failures, a program that executes some pernicious action based on exploiting the bug, Zero Day Exploit, ZDE, has to be developed and, in advance, placed on the target computer, (Clark & Knake, 2010), (Singer & Friedman, 2014). Countries wishing to become future cyber military powers need: (1) Capacity to form cyber army whose cyber troops have the indicated characteristics, (2) Get ZDEs that can be used on your opponent's computer systems and (3) Be able to exploit the ZDEs and use them to inflict damage on their opponents, (Barbosa, 2018), (Arquilla & Ronfeldt, 1993). These capabilities, perhaps, can be easily obtained in large countries, particularly in the highly technologically advanced ones, but in small countries, particularly in those less technologically advanced, they might be hard to obtain.
机译:网络战似乎拥有的潜力以及实施网络军队所需的低经济成本与传统战争中使用的手段相比,可能导致第一个巨大的外观。这也可能导致小国希望成为“网络军事力”,尽管它们可能没有条件,即经济,是“传统的军事力量”(A. Caldas,2013; Barbosa,2018)。有一些困难,但是,他们必须克服,以便他们成为可能。网络军队宪法所必需的人力资源与传统军队宪法所必需的人力资源。网络部队的身体和运动能力很重要,但智力和科学能力是基本的。计算机技术在其各种蛛网中的知识和掌握:软件,硬件,编程,网络,数据库等必须具有优异的水平。获得这些功能需要很长时间,可能无法获取。信息技术的倾向是根本的,因为能力和计算机技能有很多先天。有很多种网络武士行动,但我们考虑基于计算机错误的网络战争的行动,并且可能导致所谓的国家主权丢失。在这种情况下,最好地,这些错误,漏洞应该是未知的,零天漏洞,ZDV。要利用这些故障,必须开发基于利用BUG,零天漏洞,ZDE的一些基于漏洞,ZDE的程序,并提前放置在目标计算机上(Clark&Knake,2010),(歌手&弗里德曼,2014)。希望成为未来网络军事力的国家需要:(1)形成网络军队的网络军队的能力,其网络部队具有指定的特征,(2)可用于您的对手计算机系统和(3)能够利用ZDES的ZDES并用它们对他们的对手造成伤害,(巴巴斯,2018年),(Arquilla&Ronfeldt,1993)。这些能力,也许,可以在大个国家轻松获得,特别是在高度技术先进的国家,而是在小国,特别是在那些较低的技术前进,它们可能很难获得。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号