jump to navigation

Cyberwarfare and Encryption January 13, 2015

Posted by OromianEconomist in Cyberwarfare.
Tags: , ,
trackback

???????????

‘Cyberwarfare is defined as offensive and defensive measures designed to achieve superiority of control of cyberspace (Internet, networks, software and hardware) or parts thereof. Although cyberwarfare is often thought of as an activity practiced by the state, attacks against corporations and the theft of credit card data can also be considered attacks against state sovereignty and symbols of statehood, and, hence, cyberwarfare.’

Open Geography

The recent cyberhacking attacks on Sony, CentCom and a number of well known companies over the past few years (especially Home Depot and Target) highlight a major development in the online world known as cyberwarfare. Cyberwarfare is defined as offensive and defensive measures designed to achieve superiority of control of cyberspace (Internet, networks, software and hardware) or parts thereof.

Although cyberwarfare is often thought of as an activity practiced by the state, attacks against corporations and the theft of credit card data can also be considered attacks against state sovereignty and symbols of statehood, and, hence, cyberwarfare. The information released in the Sony attacks, despite it being a foreign company, largely pertained to American operations and that bastion of Americana, Hollywood. Especially as it was an American subsidiary, Sony Pictures Entertainment, based in Culver City, Ca. And of course governments can, and do, invoke such attacks as justification for…

View original post 1,008 more words

Comments»

No comments yet — be the first.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: