Access Restriction

Author Goel, Sanjay
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Perpetrators and victims usually act as if it never happened, while the evidence is designed to erase itself. Cyberwarfare is a potent weapon in political conflicts, espionage, and propaganda. Difficult to detect a priori, it is often recognized only after significant damage has been done. Gaining offensive capability on the cyber battlefield figures prominently in the national strategies of many countries and is explicitly stated in the doctrines of several, including China, Russia, and the U.S. It is generally understood they are laying the groundwork for potential cyber conflicts by hacking the networks of adversaries and allies alike.
Description Affiliation: University at Albany, SUNY (Goel, Sanjay)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 54
Issue Number 8
Page Count 9
Starting Page 132
Ending Page 140

Open content in new tab

   Open content in new tab
Source: ACM Digital Library