6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Christopher Perr<br />
anonymity of attackers, separates classified networks from the unclassified, develops systems where<br />
security is integral in the design, and creates a robust network which recovers gracefully from error<br />
and attack while limiting the scope of that attack at every level. This is where funding is necessary for<br />
new research an innovation in the relatively immature field of computing and networks.<br />
7. Conclusion<br />
Cyberspace is dangerous and scary. The borders are vast, and the landscape is constantly changing.<br />
Fortunately the possibilities of operating in cyberspace offers excellent rewards and given an<br />
appropriate but flexible strategy, reinforcing policy measures, and the drive to guide technological<br />
development cyberspace can also be a safe place to operate. This paper should serve as a call to<br />
make strides in these three areas, and to humbly offer up a base guide to tackling both present and<br />
future issues in cyberspace.<br />
References<br />
Agence France-Presse, US military prepares for 'cyber command:' official | ABS-CBN News | Latest Philippine<br />
Headlines, Breaking News, Video, Analysis, Features. ABS-CBN News. Available at: http://www.abscbnnews.com/technology/04/24/09/us-military-prepares-cyber-command-official<br />
[Accessed September 11,<br />
2010].<br />
Alexander, K., Advanced Questions for Lieutenant General Keith Alexander, USA, Nominee for Commander,<br />
United States Cyber Command, Available at:<br />
http://docs.google.com/viewer?a=v&q=cache:Kcm4Wm7WxDcJ:armedservices.senate.gov/statemnt/2010/04%2520April/Alexander%252004-15-<br />
10.pdf+Advance+Questions+for+Lieutenant+General+Keith+Alexander,+USA+Nominee+for+Commander&<br />
hl=en&gl=us&pid=bl&srcid=ADGEESii_NfX8DuWogAeIT3BXixKWHsUgQjUlYpebRb4XQjwsDRhXLVTbXwl<br />
aGTT7EulMH-DBJeo4rim_l2kT3M32rWC7AxmMzROsxLQwQVOYDVY2Gi9pKohKDV89kkb-<br />
GHIOMwFll3A&sig=AHIEtbSnKTroECzRqeFhTGnXyvf4JMu62A [Accessed September 11, 2010].<br />
Arquilla, J., 2007. Information strategy and warfare : a guide to theory and practice, New York: Routledge.<br />
Baocun, W. & Fei, L., INFORMATION WARFARE. Available at:<br />
http://www.fas.org/irp/world/china/docs/iw_wang.htm [Accessed September 11, 2010].<br />
Campen, A., 1992. The first information war : the story of communications, computers, and intelligence systems<br />
in the Persian Gulf War, Fairfax Va.: AFCEA International Press.<br />
Clarke, R., 2010. Cyber war : the next threat to national security and what to do about it 1st ed., New York: Ecco.<br />
Department of Homeland Security, DHS | Office of Cybersecurity and Communications. Available at:<br />
http://www.dhs.gov/xabout/structure/gc_1185202475883.shtm [Accessed September 11, 2010].<br />
Fulghum, Israel used electronic attack in air strike against Syrian mystery target - ABC News. Available at:<br />
http://abcnews.go.com/Technology/story?id=3702807&page=1 [Accessed September 11, 2010].<br />
Leyden, J., 2008. Estonia fines man for DDoS attacks • The Register. The Register. Available at:<br />
http://www.theregister.co.uk/2008/01/24/estonian_ddos_fine/ [Accessed September 11, 2010].<br />
Markoff, J., Google Asks N.S.A. to Investigate Cyberattacks - NYTimes.com. Available at:<br />
http://www.nytimes.com/2010/02/05/science/05google.html?fta=y [Accessed September 11, 2010].<br />
Markoff, J. & Barboza, D., Chinese <strong>Academic</strong>s’ Paper on Cyberwar Sets Off Alarms in U.S. - NYTimes.com.<br />
Available at: http://www.nytimes.com/2010/03/21/world/asia/21grid.html?_r=1 [Accessed September 11,<br />
2010].<br />
Markoff, J., Sanger, D.E. & Shanker, T., CYBERWAR - In Digital Combat, U.S. Finds No Easy Deterrent - Series<br />
- NYTimes.com. Available at:<br />
http://query.nytimes.com/gst/fullpage.html?res=9404E4DE123BF935A15752C0A9669D8B63 [Accessed<br />
September 11, 2010].<br />
Miller, F.P., Vandome, A.F. & McBrewster, J., 2010. Information Operations Roadmap.<br />
Miniwatts Marketing Group, United States Internet Usage, Broadband and Telecommunications Reports -<br />
Statistics. Available at: http://www.internetworldstats.com/am/us.htm [Accessed September 11, 2010].<br />
msnbc.com staff, U.S. eyes N. Korea for ‘massive’ cyber attacks - Technology & science - Security - msnbc.com.<br />
Available at: http://www.msnbc.msn.com/id/31789294 [Accessed September 11, 2010].<br />
Office of Force Transformation, 2005. Implementation of Network-Centric Warfare, Office of Force<br />
Transformation.<br />
Reuters, FBI probes cyber attack on Citigroup: report | Reuters. Available at:<br />
http://www.reuters.com/article/idUSTRE5BL0I320091222 [Accessed September 11, 2010].<br />
Trias, E.D. & Bell, B.M., Cyber This, Cyber That . . . So What? Air & Space Power Journal, Spring 2010.<br />
Available at: http://www.airpower.maxwell.af.mil/airchronicles/apj/apj10/spr10/trias.html [Accessed<br />
September 11, 2010].<br />
Wallace, R., 2009. Spycraft : the secret history of the CIA's spytechs, from communism to Al-Qaeda, New York:<br />
Plume.<br />
Waterman, S., Analysis: Who cyber smacked Estonia? - UPI.com. Available at:<br />
http://www.upi.com/Business_News/Security-Industry/2007/06/11/Analysis-Who-cyber-smacked-<br />
Estonia/UPI-26831181580439/ [Accessed September 11, 2010].<br />
212