Eine Plattform für die Wissenschaft: Bauingenieurwesen, Architektur und Urbanistik
Countering Cyberattacks During Information Operations
This paper is devoted to the disclosure of the term ‘information operations’, which are components of a broader concept - hybrid warfare. The paper examines the main thing of this modern term and reveals the logical and semantic content by studying its historical origin and analyzing information sources containing information on this topic. The material also provides a semantic description of the concept of ‘information warfare’, which is similar to information operations, but is a separate war, which can then develop into a hybrid warfare. Also, the elements of information operations, such as psychological impact, electronic warfare and computer security, are considered. In the paper, the main focus is on the description of methods of protection against computer threats. Also, in addition to the very definition of the meaning of hybrid warfare, attention is paid to the economic, social and political elements that are part of this concept. In parallel, methods of identifying elements of information operations - cyberattacks, analysis of schemes and methods of their implementation, using which such attacks are detected and eliminated are considered. Methods of protection against cyberattacks and methods of ensuring computer security are also described. The topic under consideration will be of interest to specialists in the field of information security and IT technologies. The study of this material will expand knowledge in the field of information security in the modern world and will provide a basis for further study of the topic in this area.
Countering Cyberattacks During Information Operations
This paper is devoted to the disclosure of the term ‘information operations’, which are components of a broader concept - hybrid warfare. The paper examines the main thing of this modern term and reveals the logical and semantic content by studying its historical origin and analyzing information sources containing information on this topic. The material also provides a semantic description of the concept of ‘information warfare’, which is similar to information operations, but is a separate war, which can then develop into a hybrid warfare. Also, the elements of information operations, such as psychological impact, electronic warfare and computer security, are considered. In the paper, the main focus is on the description of methods of protection against computer threats. Also, in addition to the very definition of the meaning of hybrid warfare, attention is paid to the economic, social and political elements that are part of this concept. In parallel, methods of identifying elements of information operations - cyberattacks, analysis of schemes and methods of their implementation, using which such attacks are detected and eliminated are considered. Methods of protection against cyberattacks and methods of ensuring computer security are also described. The topic under consideration will be of interest to specialists in the field of information security and IT technologies. The study of this material will expand knowledge in the field of information security in the modern world and will provide a basis for further study of the topic in this area.
Countering Cyberattacks During Information Operations
Lecture Notes in Civil Engineering
Mottaeva, Angela (Herausgeber:in) / Sokolov, Sergei (Autor:in) / Nyrkov, Anatoly (Autor:in) / Knysh, Tatiana (Autor:in) / Shvets, Artem (Autor:in)
International Scientific Conference on Architecture and Construction ; 2020
24.12.2020
17 pages
Aufsatz/Kapitel (Buch)
Elektronische Ressource
Englisch
Hybrid warfare , Information operations , Computer security , Electronic warfare , Psychological impact , Unauthorized access , CASE , Network monitoring , Network protocol analyzers , Antivirus , Cryptography , Backup , Authentication Engineering , Building Construction and Design , Sustainable Architecture/Green Buildings , Solid Construction
Countering Cyberattacks During Information Operations
TIBKAT | 2021
|To Fend Off Cyberattacks, Build a Castle
Wiley | 2023
|British Library Conference Proceedings | 1998
|British Library Online Contents | 2000
|