This article discusses the idea of a cyber-war and promotes tit-for-tat solutions and counter-attack strategies that the US could use in a cyber war. It also discusses some short term solutions for small-scale cyber attacks.
This article discusses the simulated cyber "shockwave" exercise that was carried out in Washington DC as to practice in preparation for predicted cyber-attacks against the US. It looks at the impacts on power systems, politics and the use of military intervention.
This article discusses the Russian cyber-attacks on Estonia and how it affected the country and what the country did to "Counter-attack" and prevent further attacks. It features several different opinions on cyber-attacks.
without the knowledge or consent of the owner of the equipment
main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
This PDF is a report that discusses research into the economic impacts of cyber-attack on private, small-scale, large-scale, multinational, local and international corporations as well as government financial institutions.
This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
this article talks about cyber mentors or in other words people who help out others, are stepping up in the technological world of the internet and mentoring people or users who are being bullied or bugged through online sources
This article discusses some minor impacts on a few stakeholders but goes well into detail about the IT features and explains the technology and methods involved in cyber-attacks.
This document gives an in-depth analysis into the impacts on US Corporations and non-government businesses/private firms and contractors. It includes many statistics and reviews as well as collected data from a variety of sources.