Difference between revisions of "The future of cyber-warfare 2020"

From ScenarioThinking
Jump to navigation Jump to search
 
(79 intermediate revisions by 4 users not shown)
Line 4: Line 4:
Zoran Milkovski<br>
Zoran Milkovski<br>
Stef Cobelens<br>
Stef Cobelens<br>
Bjorn Warsosemito<br>


===Questions===
01.What is the infrastructure of the Internet?<br>
02.What are the limitations or vulnerabilities of the Internet?<br>
03.What is the Internet 2?<br>
04.What are the demographics of the Internet?<br>
05.What are the most common ways of accessing the Internet?<br>
06.What is the e-government?<br>
07.What is a virtual community?<br>
08.What are government databases?<br>
09.What is computer surveillance/massive surveillance?<br>
10.What is hacktivism and Internet activism?<br>
11.What is cyber-terrorism?<br>
12.Wich major events of cyber-warefare/cyber-terrorism have happened in the past?<br>
13.What is malicious software?<br>
14.What is e-money?<br>
15.What is the Internet privacy?<br>
16.What is the Internet censorship?<br>


-Stef<br>
[[Initial questions]]
20. What is Cyber-space?<br>
 
21. What is Information warfare?<br>
===Driving forces===
22. What are the standard preventive security measures against a cyber attack?<br>
-Political-<br>
23. What is Cyber-crime?<br>
#[[International conflicts]]<br>
24. What kind of damage can a cyber-attack do?<br>
#[[Cyberspace domination]]<br>
25. Which kind people are involved in cyber-warfare?<br>
 
26. What are the three aspects of security?<br>
-Economic-<br>
27. What is a firewall?<br>
#[[Information costs]]<br>
28. What is a botnet?<br>
#[[Affordability of cyber-warfare]]<br>
29. What is a DDoS attack?<br>
 
Awnsers: [[Media:10Q&A Stef.doc]]<br>
-Technological-<br>
<br>
#[[Security systems]]<br>
30. Cyber warfare, crime, terrorism or full-scale war?<br>
#[[Offensive weapons (virusses/worms/hackers)]]<br>
31. Can cyber warfare have serious consequences like the Manhattan project or 9/11?<br>
#[[Dominant platforms (hardware/software)]]<br>
32. Vigilantes in the Cyberspace?<br>
 
33. Government plans for cyber warfare (defensive and offensive strategy)?<br>
-Resources & Environmental-<br>
34. Shifts in battlefields locations?<br>
#[[The issue of critical systems coming online]]<br>
35. Spies in the cyberspace?<br>
 
36. Cyber warfare as a propaganda machine?<br>
===System Diagram===
37. Motivated cyber riots?<br>
http://scenariothinking.org/wiki/index.php/Image:SystemDiagram_CyberWarfare.pdf
38. Privately vs. Government vs. Individual attacks?<br>
 
39. Possibility for systematically targeted attacks in disabling a whole country?<br>
===Scenarios===
-Zoran<br>
[[The first W.A.R.]]<br>
[[Rotten from within]]<br>
[[And life goes on]]<br>
 
===Resources===
http://www.nato.int/docu/review/2001/0104-04.htm<br>
http://staff.washington.edu/dittrich/cyberwarfare.html<br>
http://www.wired.com/search?query=cyber+warfare&siteAlias=all&x=292&y=24<br>
http://www.schneier.com/blog/archives/2007/06/cyberwar.html<br>
http://www.defensetech.org/archives/cat_cyberwarfare.html<br>
 
<!--
the forces we rejected
#[[Economic divide]]<br>
#[[Growing dependency on the Internet]]<br>
-Social-<br>
#[[Ethnic/religious intolerance/fanaticism]]<br>
#[[Trend towards Globalization]]<br>
-->

Latest revision as of 15:52, 16 July 2008