Skip to main content

2018 | OriginalPaper | Buchkapitel

13. Cyber Weapons and Cyber Warfare

verfasst von : John F. Dooley

Erschienen in: History of Cryptography and Cryptanalysis

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A cyber attack is any type of offensive action employed by nation-states, individuals, groups, or organizations that targets computer information systems, infrastructures, computer networks, or personal computer devices by various means of malicious acts. Cyber attacks typically originate from an anonymous source that steals, alters, or destroys a specified target by hacking into a vulnerable system (https://​en.​wikipedia.​org/​wiki/​Cyberattack). Cyber warfare involves the actions by a nation-state to attack and attempt to damage another nation’s computers or information infrastructure through, for example, computer viruses, worms, or denial-of-service attacks. In this chapter we’ll look at various types of cryptologic techniques used in cyber attacks and discuss the possibilities of using cryptology in cyber warfare; the chapter does not go deeply into system vulnerabilities and attacks or into cyber attack prevention, mitigation, or response.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
http://malware.wikia.com/wiki/Conficker
 
4
Ritchie (1941–2011) was also the creator of the C programming language and a major influence in the development of Unix at Bell Labs.
 
5
For Paul Graham see http://​www.​paulgraham.​com/​index.​html Andy Sudduth (1961–2006) besides being Morris’ friend was also a champion rower, having several national rowing championships to his credit and an Olympic silver medal.
 
6
Paul Graham, in his essay The Submarine (http://​www.​paulgraham.​com/​submarine.​html) says “The most striking example I know of this type is the “fact” that the Internet worm of 1988 infected 6000 computers. I was there when it was cooked up, and this was the recipe: someone guessed that there were about 60,000 computers attached to the Internet, and that the worm might have infected 10% of them. Actually no one knows how many computers the worm infected, because the remedy was to reboot them, and this destroyed all traces. But people like numbers. And so this one is now replicated all over the Internet, like a little worm of its own.”
 
7
Zimmermann in “Why I wrote PGP,” circa 1991 (underlining added) https://​philzimmermann.​com/​EN/​essays/​index.​html
 
8
Actually, he wrote his own cryptographic algorithm at first, but then quickly switched to RSA.
 
Literatur
Zurück zum Zitat Hafner, Katie, and John Markoff. 1991. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon and Schuster. Hafner, Katie, and John Markoff. 1991. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon and Schuster.
Zurück zum Zitat Mitnick, Kevin, and William Simon. 2011. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. New York: Little Brown and Co. Mitnick, Kevin, and William Simon. 2011. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. New York: Little Brown and Co.
Zurück zum Zitat Painter, Christopher M.E. 2001. Supervised Release and Probation Restrictions In Hacker Cases. United States Attorneys Bulletin 49 (2): 43–48. Painter, Christopher M.E. 2001. Supervised Release and Probation Restrictions In Hacker Cases. United States Attorneys Bulletin 49 (2): 43–48.
Zurück zum Zitat Seeley, Donn. 1988. A Tour of the Worm. Salt Lake City: University of Utah. Seeley, Donn. 1988. A Tour of the Worm. Salt Lake City: University of Utah.
Zurück zum Zitat Singh, Simon. 1999. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. Hardcover. New York: Doubleday. Singh, Simon. 1999. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. Hardcover. New York: Doubleday.
Zurück zum Zitat Thompson, Ken. 1984. Reflections on Trusting Trust. CACM 27 (8): 761–763.CrossRef Thompson, Ken. 1984. Reflections on Trusting Trust. CACM 27 (8): 761–763.CrossRef
Zurück zum Zitat Zimmermann, Philip R. 1996. The Official PGP User’s Guide. Cambridge, MA: MIT Press. Zimmermann, Philip R. 1996. The Official PGP User’s Guide. Cambridge, MA: MIT Press.
Metadaten
Titel
Cyber Weapons and Cyber Warfare
verfasst von
John F. Dooley
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-90443-6_13