Difference between revisions of "The future of cyber-warfare 2020"

From ScenarioThinking
Jump to navigation Jump to search
 
(29 intermediate revisions by 4 users not shown)
Line 4: Line 4:
Zoran Milkovski<br>
Zoran Milkovski<br>
Stef Cobelens<br>
Stef Cobelens<br>
[[Initial questions]]
===Driving forces===
-Political-<br>
#[[International conflicts]]<br>
#[[Cyberspace domination]]<br>
-Economic-<br>
#[[Information costs]]<br>
#[[Affordability of cyber-warfare]]<br>
-Technological-<br>
#[[Security systems]]<br>
#[[Offensive weapons (virusses/worms/hackers)]]<br>
#[[Dominant platforms (hardware/software)]]<br>
-Resources & Environmental-<br>
#[[The issue of critical systems coming online]]<br>
===System Diagram===
http://scenariothinking.org/wiki/index.php/Image:SystemDiagram_CyberWarfare.pdf
===Scenarios===
[[The first W.A.R.]]<br>
[[Rotten from within]]<br>
[[And life goes on]]<br>


===Resources===
===Resources===
http://www.nato.int/docu/review/2001/0104-04.htm<br>
http://www.nato.int/docu/review/2001/0104-04.htm<br>
http://staff.washington.edu/dittrich/cyberwarfare.html<br>
http://staff.washington.edu/dittrich/cyberwarfare.html<br>
http://www.wired.com/search?query=cyber+warfare&siteAlias=all&x=292&y=24
http://www.wired.com/search?query=cyber+warfare&siteAlias=all&x=292&y=24<br>
 
http://www.schneier.com/blog/archives/2007/06/cyberwar.html<br>
===Questions===
http://www.defensetech.org/archives/cat_cyberwarfare.html<br>
- George<br>
#[[What is the Internet backbone?]]<br>
#[[What is the Internet 2?]]<br>
#[[What are the demographics of the Internet?]]<br>
#[[What are the most common ways of accessing the Internet?]]<br>
#[[What is the e-government?]]<br>
#[[What is a virtual community?]]<br>
#[[What are government databases?]]<br>
#[[What is mass surveillance?]]<br>
#[[What is hacktivism?]]<br>
#[[What is cyber-terrorism?]]<br>
#[[What is malicious software?]]<br>
#[[What is e-money?]]<br>
#[[What is data privacy?]]<br>
#[[What is Internet censorship?]]<br>
#[[What is Internet activism?]]<br>
#[[What is a data spill?]]<br>
#[[What kind of devices can be connected to the Internet?]]<br>
#[[What are the limitations or vulnerabilities of the Internet?]]<br>
#[[Which major events of cyber-warefare/cyber-terrorism have happened in the past?]]<br>
#[[How complex can the Internet be?]]<br>
-Stef<br>
#[[What is the intranet?]]<br>
#[[What is an Intrusion Dectection System?]]<br>
#[[What are the cyber vulnerabilities most often cited?]]<br>
#[[What is malware?]]<br>
#[[What is the key recommendation of the National Strategy(US) to Secure Cyberspace?]]<br>
#[[What is a trojan horse?]]<br>
#[[What is virus?]]<br>
#[[What is warfare?]]<br>
#[[What is Cyber-space?]]<br>
#[[What is Information warfare?]]<br>
#[[What are the standard preventive security measures against a cyber attack?]]<br>
#[[What is Cyber-crime?]]<br>
#[[What kind of damage can a cyber-attack do?]]<br>
#[[Which kind people are involved in cyber-warfare?]]<br>
#[[What are the three aspects of security?]]<br>
#[[What is a firewall?]]<br>
#[[What is a botnet?]]<br>
#[[What is a DDoS attack?]]<br>


<br>
<!--  
-Zoran<br>
the forces we rejected
#[[Cyber warfare, crime, terrorism or full-scale war?]]<br>
#[[Economic divide]]<br>
#[[Can cyber warfare have serious consequences like the Manhattan project or 9/11?]]<br>
#[[Growing dependency on the Internet]]<br>
#[[Vigilantes in the Cyberspace?]]<br>
-Social-<br>
#[[Government plans for cyber warfare (defensive and offensive strategy)?]]<br>
#[[Ethnic/religious intolerance/fanaticism]]<br>
#[[Shifts in battlefields locations?]]<br>
#[[Trend towards Globalization]]<br>
#[[Spies in the cyberspace?]]<br>
-->
#[[Cyber warfare as a propaganda machine?]]<br>
#[[Motivated cyber riots?]]<br>
#[[Privately vs. Government vs. Individual attacks?]]<br>
#[[Possibility for systematically targeted attacks in disabling a whole country?]]<br>
#[[How does cyber warfare affect the physical world today?]]<br>
#[[What is the human factor in cyber warfare?]]<br>
#[[Can the computers actually win a war?]]<br>
#[[Information revolution as the main cause behind shift in battlefield?]]<br>
#[[John Arquilla and David Ronfeldt’s distinction between Netwar and Cyberwar?]]<br>
#[[Tools and benefits required for cyberspace domination?]]<br>
#[[Cyberwar, next logical step in military doctrine?]]<br>
#[[Extensive cyber attack and the psychological consequences?]]<br>
#[[Time constraints in an effective cyber attack?]]<br>
#[[Liability laws as protection for the target of an attack?]]<br>
<br>
-Stefan<br>
#[[What are the different categories of cyber warfare?]]<br>
#[[Who are the big players now?]]<br>
#[[Who are the emerging players?]]<br>
#[[Which are the leading research institutes for cyber warfare technologies?]]<br>
#[[Current trends of cyber weapons development?]]<br>
#[[Official policies for cyber warefare and budgets?]]<br>
#[[Hotzones and current cyber warfare conflicts?]]<br>
#[[What are the legislations for cyber warfare?]]<br>
#[[Are there any international treaties regarding cyber warfare?]]<br>
#[[How cyber warfare is recognized by international bodies?]]<br>
#[[When and how cyber warfare started?]]<br>
#[[Costs of cyber warfare?]]<br>
#[[Differences b/n cyber and conventional warfare?]]<br>
#[[Does cyber warfare can change the odds in a potential conflict?]]<br>
#[[How cyber warfare is integrated in military way of thought?]]<br>
#[[What are the actions the US government is taking in terms of cyber warfare?]]<br>
#[[What were information warfare activites?]]<br>
#[[What other activites USA is making in order to protect itself from cyber attacks?]]<br>
#[[Information Assurance – the Achilles’ Heel of Joint Vision 2010?]]<br>
#[[What are the Legal and Practical Constraints on Information Warfare?]]<br>
 
<br><br><h2 style="background-color: #F5F9FA; border-left:1px solid #AAAAAA;border-right:1px solid #AAAAAA; padding-left: 10px;">Driving Forces </h2>
#[[Defense mechanisms (firewalls/IDS/IPS)]]<br>
#[[Software architecture]]<br>
#[[Offensive weapons (virusses/worms/hackers)]]<br>

Latest revision as of 15:52, 16 July 2008