CYBER-WEAPONS

被引:57
作者
Rid, Thomas [1 ]
Mcburney, Peter [2 ]
机构
[1] Kings Coll London, War Studies, London, England
[2] Kings Coll London, Dept Informat, Agents & Intelligent Syst Grp, London, England
关键词
D O I
10.1080/03071847.2012.664354
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
What are cyber-weapons? Instruments of code-borne attack span a wide spectrum, from generic but low-potential tools to specific but high-potential weaponry. This distinction brings into relief a two-pronged hypothesis that stands in stark contrast to some of the received wisdom on cyber-security. Maximising the destructive potential of a cyber-weapon is likely to come with a double effect: it will significantly increase the resources, intelligence and time required for development and deployment and more destructive potential is likely to decrease the number of targets, the risk of collateral damage and the political utility of cyber-weapons.
引用
收藏
页码:6 / 13
页数:8
相关论文
共 33 条
[21]  
MARKOFF J, 2010, NY TIMES 0205, pA6
[22]  
Medetsky Anatoly, 2004, MOSCOW TIMES
[23]   DIPLOMATIC ALTERNATIVES TO CYBER-WARFARE A NEAR-TERM AGENDA [J].
Meyer, Paul .
RUSI JOURNAL, 2012, 157 (01) :14-19
[24]  
Nakashima Ellen, 2011, WASHINGTON POST
[25]  
Raum Tom, 2000, ASS PRESS
[26]  
Rid Thomas, 2012, J STRATEGIC STUDIES, V35
[27]  
Sanger David, 2011, NY TIMES, pSR1
[28]   Lessons learned from the Maroochy Water breach [J].
Slay, Jill ;
Miller, Michael .
CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 :73-+
[29]  
Smith Tony, 2001, REGISTER
[30]  
Sullivan Sean, 2011, F SECURE