Difference between revisions of "The future of cyber-warfare 2020"

From ScenarioThinking
Jump to navigation Jump to search
Line 20: Line 20:
http://www.defensetech.org/archives/cat_cyberwarfare.html<br>
http://www.defensetech.org/archives/cat_cyberwarfare.html<br>


===Questions===
[[Initial questions]]
- George<br>
#[[What is the Internet backbone?]]<br>
#[[What is the Internet 2?]]<br>
#[[What are the demographics of the Internet?]]<br>
#[[What are the most common ways of accessing the Internet?]]<br>
#[[What is the e-government?]]<br>
#[[What is a virtual community?]]<br>
#[[What are government databases?]]<br>
#[[What is mass surveillance?]]<br>
#[[What is hacktivism?]]<br>
#[[What is cyber-terrorism?]]<br>
#[[What is malicious software?]]<br>
#[[What is e-money?]]<br>
#[[What is data privacy?]]<br>
#[[What is Internet censorship?]]<br>
#[[What is Internet activism?]]<br>
#[[What is a data spill?]]<br>
#[[What kind of devices can be connected to the Internet?]]<br>
#[[What are the limitations or vulnerabilities of the Internet?]]<br>
#[[Which major events of cyber-warefare/cyber-terrorism have happened in the past?]]<br>
#[[How complex can the Internet be?]]<br>
-Stef<br>
#[[What is cyber-warfare?]]<br>
#[[What is the internet?]]<br>
#[[What is the intranet?]]<br>
#[[What is an Intrusion Dectection System?]]<br>
#[[What are the cyber vulnerabilities most often cited?]]<br>
#[[What is malware?]]<br>
#[[What is the key recommendation of the National Strategy(US) to Secure Cyberspace?]]<br>
#[[What is a trojan horse?]]<br>
#[[What is virus?]]<br>
#[[What is warfare?]]<br>
#[[What is Cyber-space?]]<br>
#[[What is Information warfare?]]<br>
#[[What are the standard preventive security measures against a cyber attack?]]<br>
#[[What is Cyber-crime?]]<br>
#[[What kind of damage can a cyber-attack do?]]<br>
#[[Which kind people are involved in cyber-warfare?]]<br>
#[[What are the three aspects of security?]]<br>
#[[What is a firewall?]]<br>
#[[What is a botnet?]]<br>
#[[What is a DDoS attack?]]<br>
 
<br>
-Zoran<br>
#[[Cyber warfare, crime, terrorism or full-scale war?]]<br>
#[[Can cyber warfare have serious consequences like the Manhattan project or 9/11?]]<br>
#[[Vigilantes in the Cyberspace?]]<br>
#[[Government plans for cyber warfare (defensive and offensive strategy)?]]<br>
#[[Shifts in battlefields locations?]]<br>
#[[Spies in the cyberspace?]]<br>
#[[Cyber warfare as a propaganda machine?]]<br>
#[[Motivated cyber riots?]]<br>
#[[Privately vs. Government vs. Individual attacks?]]<br>
#[[Possibility for systematically targeted attacks in disabling a whole country?]]<br>
#[[How does cyber warfare affect the physical world today?]]<br>
#[[What is the human factor in cyber warfare?]]<br>
#[[Can the computers actually win a war?]]<br>
#[[Information revolution as the main cause behind shift in battlefield?]]<br>
#[[John Arquilla and David Ronfeldt’s distinction between Netwar and Cyberwar?]]<br>
#[[Tools and benefits required for cyberspace domination?]]<br>
#[[Cyberwar, next logical step in military doctrine?]]<br>
#[[Extensive cyber attack and the psychological consequences?]]<br>
#[[Time constraints in an effective cyber attack?]]<br>
#[[Liability laws as protection for the target of an attack?]]<br>
<br>
-Stefan<br>
#[[What are the different categories of cyber warfare?]]<br>
#[[Who are the big players now?]]<br>
#[[Who are the emerging players?]]<br>
#[[Which are the leading research institutes for cyber warfare technologies?]]<br>
#[[Current trends of cyber weapons development?]]<br>
#[[Official policies for cyber warefare and budgets?]]<br>
#[[Hotzones and current cyber warfare conflicts?]]<br>
#[[What are the legislations for cyber warfare?]]<br>
#[[Are there any international treaties regarding cyber warfare?]]<br>
#[[How cyber warfare is recognized by international bodies?]]<br>
#[[When and how cyber warfare started?]]<br>
#[[Costs of cyber warfare?]]<br>
#[[Differences b/n cyber and conventional warfare?]]<br>
#[[Does cyber warfare can change the odds in a potential conflict?]]<br>
#[[How cyber warfare is integrated in military way of thought?]]<br>
#[[What are the actions the US government is taking in terms of cyber warfare?]]<br>
#[[What were information warfare activites?]]<br>
#[[What other activites USA is making in order to protect itself from cyber attacks?]]<br>
#[[Information Assurance – the Achilles’ Heel of Joint Vision 2010?]]<br>
#[[What are the Legal and Practical Constraints on Information Warfare?]]<br>


===Driving forces===
===Driving forces===

Revision as of 15:51, 16 July 2008