Eine Plattform für die Wissenschaft: Bauingenieurwesen, Architektur und Urbanistik
Cybernetic Attacks as a Component of Information Operations During the Hybrid Warfare
This paper is devoted to disclosing the meaning of the term ‘cyber attacks’, which, in turn, are part of the broader concept of ‘hybrid warfare’ and are used during information operations both in peacetime and during martial law. The paper examines the types and examples of individual threats that have been used recently or are still being used today, even in the absence of direct military conflicts. It also provides a summary of how such attacks interact with other elements of information warfare, and why they deserve special attention in our time, along with other manifestations of information aggression. Cyber attacks, their types and methods of implementation are considered together with methods of countering them, based on examples from recent events that have actually taken place. Methods of their identification and methods of analysis of the schemes are considered, using which the special services of different countries detect these threats, eliminate or completely prevent them, depending on the goals pursued. The result of the studies is the logical conclusion that despite the fact that there are no direct clashes and large-scale human losses during information operations, they are militaristic in relation to the one at whom they are directed, and most often their purpose is to violate the civil infrastructure of the state, which leads to the moral and informational decay of society, and, accordingly, to a weakening of the political influence of the losing side on the world arena. This paper reveals modern methods of information warfare, which are used at the interstate level, and the impact they exert on society.
Cybernetic Attacks as a Component of Information Operations During the Hybrid Warfare
This paper is devoted to disclosing the meaning of the term ‘cyber attacks’, which, in turn, are part of the broader concept of ‘hybrid warfare’ and are used during information operations both in peacetime and during martial law. The paper examines the types and examples of individual threats that have been used recently or are still being used today, even in the absence of direct military conflicts. It also provides a summary of how such attacks interact with other elements of information warfare, and why they deserve special attention in our time, along with other manifestations of information aggression. Cyber attacks, their types and methods of implementation are considered together with methods of countering them, based on examples from recent events that have actually taken place. Methods of their identification and methods of analysis of the schemes are considered, using which the special services of different countries detect these threats, eliminate or completely prevent them, depending on the goals pursued. The result of the studies is the logical conclusion that despite the fact that there are no direct clashes and large-scale human losses during information operations, they are militaristic in relation to the one at whom they are directed, and most often their purpose is to violate the civil infrastructure of the state, which leads to the moral and informational decay of society, and, accordingly, to a weakening of the political influence of the losing side on the world arena. This paper reveals modern methods of information warfare, which are used at the interstate level, and the impact they exert on society.
Cybernetic Attacks as a Component of Information Operations During the Hybrid Warfare
Lecture Notes in Civil Engineering
Mottaeva, Angela (Herausgeber:in) / Sokolov, Sergei (Autor:in) / Nyrkov, Anatoly (Autor:in) / Knysh, Tatiana (Autor:in) / Demakov, Yaroslav (Autor:in)
International Scientific Conference on Architecture and Construction ; 2020
24.12.2020
17 pages
Aufsatz/Kapitel (Buch)
Elektronische Ressource
Englisch
Hybrid warfare , Information operations , Information warfare , Cyber attacks , Denial of service , Web vulnerabilities , Social engineering , Compromise , Virus , Trojan , SQL injection , Cookie , Hacker Engineering , Building Construction and Design , Sustainable Architecture/Green Buildings , Solid Construction
Cybernetic Guerrilla Warfare Revisited: From Klein Worms to Relational Circuits
Online Contents | 2011
|Cybernetic theory & architecture
British Library Conference Proceedings | 1997
|