首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到12条相似文献,搜索用时 0 毫秒
1.
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.  相似文献   

2.
A response to John Stone, Dale Peterson, and Gary McGraw on cyber war.  相似文献   

3.
Deploying cyber weapons to damage Industrial Control Systems (ICS) is relatively easy because such systems are insecure by design. Maintaining communication with an activated cyber weapon, and ensuring its persistence, is harder but feasible.  相似文献   

4.
A large collection of captured documents from the very highest levels of the Iraqi government offers a chance to gain insight into why Saddam Hussein was unwilling and unable to alter his strategy on the eve of the 2003 war that toppled his regime. This paper explores some of the perceptions and misperceptions that Saddam Hussein took away from the 1991 Gulf War and shows how they affected his decisionmaking on the eve of the war in 2003. It concludes with some thoughts on the policy implications of these findings.  相似文献   

5.
Conventional wisdom holds that Pakistanis are overwhelmingly opposed to American drone strikes in their country’s tribal areas and that this opposition is driven by mass media coverage of the loss of life and property the strikes purportedly cause. Using an approach based in the literature in political communication and public opinion, we argue this conventional wisdom is largely inaccurate. Instead, we contend that awareness of drone strikes will be limited because Pakistan is a poor country with low educational attainment, high rates of illiteracy and persistent infrastructure problems that limit access to mass media. Moreover, because of these same country characteristics, Pakistanis’ beliefs about drone strikes will be shaped primarily by informal, face-to-face political communication, rather than through more formal media sources. We test this argument using data that we collected by fielding a 7,656 respondent, nationally-representative survey carried out in Pakistan in 2013. The results of the statistical analysis support our arguments.  相似文献   

6.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   

7.
针对防空指挥控制系统情报融合能力测试需要,重点研究了测试空情设计问题。具体论述了防空情报融合的目的和评判准则,基于提出的评判准则分析了测试空情设计策略和步骤,设计了测试空情基本用例,开发设计了测试系统。经仿真测试,测试系统能较好地满足空情设计需求,支持防空指挥控制系统情报融合能力测试。  相似文献   

8.
    
Washington's so-called Maritime Strategy, which sought to apply US naval might against Soviet vulnerabilities on its maritime flanks, came to full fruition during the 1980s. The strategy, which witnessed a major buildup of US naval forces and aggressive exercising in seas proximate to the USSR, also explicitly targeted Moscow”s strategic missile submarines with the aim of pressuring the Kremlin during crises or the early phases of global war. Relying on a variety of interviews and newly declassified documents, the authors assert that the Maritime Strategy represents one of the rare instances in history when intelligence helped lead a nation to completely revise its concept of military operations.  相似文献   

9.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   

10.
边缘计算将数据处理任务放置在网络边缘(靠近数据源)的设备上,可以快速实现实时数据处理,具有低延迟、隐私安全性和灵活性的特点,被认为是人工智能的最后一公里.近年来,边缘计算的飞速发展在不断推动边缘人工智能物联网的发展.对2019年边缘计算的相关研究与成果进行了综合评述,并对未来发展趋势进行了展望.首先,梳理2019年...  相似文献   

11.
The spectacular commando-style terrorist strike on Mumbai in November 2008 exposed India's lax internal security structure. As nearly all the security apparatus broke down during the long spell of attacks, massive public outrage flared up across the country calling for a firmer government response. Shockingly, India has done little to prevent a recurrence and a new security threat faces the country every single day not merely before but even after the Mumbai attacks. In contrast, Pakistan's Inter Services Intelligence and the Lashkar-e-Taiba have successfully evaded pressures from both India and the international community and continue their terror campaign against India under the “Karachi Project” with the explicit intention to unsettle South Asia. Classified documents indicated that India is at the forefront of a cataclysmic “nuclear terrorism” threat from a “combination of Pakistan-based terrorists and homegrown radicals.” This article analyses the danger posed by the Indo-Pak radical groups targeting India and India's lack of preparedness to the new security threat from the “Karachi Project.”  相似文献   

12.
This article focuses on the relationship between the threat perception analyses of the British Admiralty and the strategic orientation of the Royal Navy at the outset of the twentieth century. The current view is that this was an era when fear of France and Russia drove British naval policy. However, as this article will show, Britain's Naval Intelligence Department formed a low opinion of French and Russian naval capabilities at this time and this negative evaluation exerted considerable influence over decision making. The belief that, owing to multiple qualitative deficiencies, these powers could definitely be beaten in battle lessened the standing of the Franco-Russian naval challenge and freed the Admiralty to consider the danger posed by other possible enemies, most notably Germany.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号