Information Warfare
2018
https://doi.org/10.13140/RG.2.2.12798.51526…
14 pages
1 file
Sign up for access to the world's latest research
Abstract
Information warfare is the illegal activity done online by an individual, or a group that is motivated by money or benefits send by a country or a group to harm another country or gain information about it. The act of gaining unauthorized access to a network or a system known as hacking according to Debra Geoghan (2012).
Related papers
This report investigates the aggregate picture that emerges from these reports. We collected around 70 studies that were published by CERTs, security companies, and research organizations from 15 countries from the last few years. In three chapters, we look at what these reports say about the threats in cyber space. Chapter 2 gives a quantitative overview of cyber attacks. It focuses on the reporting itself, the general trends, perpetrators, targets, tools and techniques used, and their impact. Chapter 3 looks at some new trends mentioned in these reports, and gives a (non-exhaustive) overview of some trends that can help broaden our ‘cyber threat horizon’. In chapter 4, we zoom in on the responses to these threats from the private and public sector, and the public. Do we see gaps in the assessment of threats, and focus of the strategies in place? A final chapter lists the main conclusions of this report, with recommendations for the future.
KSII Transactions on Internet and Information Systems, 2011
Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.
International Standard Book Number-10: 0-8493-2341-X (Hardcover) International Standard Book Number-13: 978-0-8493-2341-6 (Hardcover)
This collection includes five complementary chapters to help the reader understand Turkey's cyber security challenges with a focus on nuclear power plants as components of the country's critical infrastructure. The first chapter introduces the concept of cyberwarfare as the next Revolution in Military Affairs, and looks into cyber trends, emerging state capabilities and threats from Turkey's perspective. The second chapter examines the cyber security scene in Turkey by both looking into the relative governmental agencies, institutions and security forces working on ensuring the country's cyber security and develops policies in these areas, and on the other hand, at malicious hacker groups operating from within the country. The third chapter evaluates possible cyber-threats to the future nuclear infrastructure of Turkey and analyzes the country's capability to provide security against such incidents. The fourth chapter clarifies the concept of cyber security and its relevance to nuclear power plants and facilities, and examines previous incidents. The fifth and final chapter evaluates Turkey's capabilities in terms of ensuring cyber security resilience, and its prospective cooperation with international actors on this field.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.