27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Christopher Perr<br />

anonymity of attackers, separates classified networks from the unclassified, develops systems where<br />

security is integral in the design, and creates a robust network which recovers gracefully from error<br />

and attack while limiting the scope of that attack at every level. This is where funding is necessary for<br />

new research an innovation in the relatively immature field of computing and networks.<br />

7. Conclusion<br />

Cyberspace is dangerous and scary. The borders are vast, and the landscape is constantly changing.<br />

Fortunately the possibilities of operating in cyberspace offers excellent rewards and given an<br />

appropriate but flexible strategy, reinforcing policy measures, and the drive to guide technological<br />

development cyberspace can also be a safe place to operate. This paper should serve as a call to<br />

make strides in these three areas, and to humbly offer up a base guide to tackling both present and<br />

future issues in cyberspace.<br />

References<br />

Agence France-Presse, US military prepares for 'cyber command:' official | ABS-CBN News | Latest Philippine<br />

Headlines, Breaking News, Video, Analysis, Features. ABS-CBN News. Available at: http://www.abscbnnews.com/technology/04/24/09/us-military-prepares-cyber-command-official<br />

[Accessed September 11,<br />

2010].<br />

Alexander, K., Advanced Questions for Lieutenant General Keith Alexander, USA, Nominee for Commander,<br />

United States Cyber Command, Available at:<br />

http://docs.google.com/viewer?a=v&q=cache:Kcm4Wm7WxDcJ:armedservices.senate.gov/statemnt/2010/04%2520April/Alexander%252004-15-<br />

10.pdf+Advance+Questions+for+Lieutenant+General+Keith+Alexander,+USA+Nominee+for+Commander&<br />

hl=en&gl=us&pid=bl&srcid=ADGEESii_NfX8DuWogAeIT3BXixKWHsUgQjUlYpebRb4XQjwsDRhXLVTbXwl<br />

aGTT7EulMH-DBJeo4rim_l2kT3M32rWC7AxmMzROsxLQwQVOYDVY2Gi9pKohKDV89kkb-<br />

GHIOMwFll3A&sig=AHIEtbSnKTroECzRqeFhTGnXyvf4JMu62A [Accessed September 11, 2010].<br />

Arquilla, J., 2007. Information strategy and warfare : a guide to theory and practice, New York: Routledge.<br />

Baocun, W. & Fei, L., INFORMATION WARFARE. Available at:<br />

http://www.fas.org/irp/world/china/docs/iw_wang.htm [Accessed September 11, 2010].<br />

Campen, A., 1992. The first information war : the story of communications, computers, and intelligence systems<br />

in the Persian Gulf War, Fairfax Va.: AFCEA International Press.<br />

Clarke, R., 2010. Cyber war : the next threat to national security and what to do about it 1st ed., New York: Ecco.<br />

Department of Homeland Security, DHS | Office of Cybersecurity and Communications. Available at:<br />

http://www.dhs.gov/xabout/structure/gc_1185202475883.shtm [Accessed September 11, 2010].<br />

Fulghum, Israel used electronic attack in air strike against Syrian mystery target - ABC News. Available at:<br />

http://abcnews.go.com/Technology/story?id=3702807&page=1 [Accessed September 11, 2010].<br />

Leyden, J., 2008. Estonia fines man for DDoS attacks • The Register. The Register. Available at:<br />

http://www.theregister.co.uk/2008/01/24/estonian_ddos_fine/ [Accessed September 11, 2010].<br />

Markoff, J., Google Asks N.S.A. to Investigate Cyberattacks - NYTimes.com. Available at:<br />

http://www.nytimes.com/2010/02/05/science/05google.html?fta=y [Accessed September 11, 2010].<br />

Markoff, J. & Barboza, D., Chinese <strong>Academic</strong>s’ Paper on Cyberwar Sets Off Alarms in U.S. - NYTimes.com.<br />

Available at: http://www.nytimes.com/2010/03/21/world/asia/21grid.html?_r=1 [Accessed September 11,<br />

2010].<br />

Markoff, J., Sanger, D.E. & Shanker, T., CYBERWAR - In Digital Combat, U.S. Finds No Easy Deterrent - Series<br />

- NYTimes.com. Available at:<br />

http://query.nytimes.com/gst/fullpage.html?res=9404E4DE123BF935A15752C0A9669D8B63 [Accessed<br />

September 11, 2010].<br />

Miller, F.P., Vandome, A.F. & McBrewster, J., 2010. Information Operations Roadmap.<br />

Miniwatts Marketing Group, United States Internet Usage, Broadband and Telecommunications Reports -<br />

Statistics. Available at: http://www.internetworldstats.com/am/us.htm [Accessed September 11, 2010].<br />

msnbc.com staff, U.S. eyes N. Korea for ‘massive’ cyber attacks - Technology & science - Security - msnbc.com.<br />

Available at: http://www.msnbc.msn.com/id/31789294 [Accessed September 11, 2010].<br />

Office of Force Transformation, 2005. Implementation of Network-Centric Warfare, Office of Force<br />

Transformation.<br />

Reuters, FBI probes cyber attack on Citigroup: report | Reuters. Available at:<br />

http://www.reuters.com/article/idUSTRE5BL0I320091222 [Accessed September 11, 2010].<br />

Trias, E.D. & Bell, B.M., Cyber This, Cyber That . . . So What? Air & Space Power Journal, Spring 2010.<br />

Available at: http://www.airpower.maxwell.af.mil/airchronicles/apj/apj10/spr10/trias.html [Accessed<br />

September 11, 2010].<br />

Wallace, R., 2009. Spycraft : the secret history of the CIA's spytechs, from communism to Al-Qaeda, New York:<br />

Plume.<br />

Waterman, S., Analysis: Who cyber smacked Estonia? - UPI.com. Available at:<br />

http://www.upi.com/Business_News/Security-Industry/2007/06/11/Analysis-Who-cyber-smacked-<br />

Estonia/UPI-26831181580439/ [Accessed September 11, 2010].<br />

212

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!