Information Technology Reference
In-Depth Information
x National commercial operators and businesses in countries are potentially the first
cybertargets, but an eternal demand for reducing costs and maximizing profits
make preparing for cyberwar very problematic for businesses
x Cooperation between government and business in countries is essential for
protecting the nation's information infrastructure from any kind of cyberwar
x The fight against cyberterrorism, computer hacking and economic cyber
deception has to be rated as a common strategy for any national government in
the Information Age and requires consecutive coordinated interaction between
groups of national governments
REFERENCES
1.
Joint Publication 2-01 'Joint Intelligence Support to Military Operations' (JP 2-
01) 20 November 1996, www.militaryworld.com, www.dtic.mil/
2.
Joint Publication 3-13 'Joint Doctrine for Information Operations' 9 October
1998 (JP 3-13) 9 October 1998, www.militaryworld.com, www.dtic.mil/
3.
Joint Publication 1-02 'Department of Defense Dictionary of Military and
Associated
Terms'
(As
amended
through
15
October
2001),
www.militaryworld.com, www.dtic.mil/
4. John Arquilla, David Ronfeldt, In Athena's Camp: Preparing for Conflict in the
Information Age. http://www.rand.org/publications/MR/MR880/index.html
5. Martin Dodge, Rob Kitchin, Atlas of Cyberspace. Addison-Wesley, 2001, P.
268.
6. http://www.skbkontur.ru/personal/blink/eng/gumi.htm
7. Sun Tzu. The Art of War. http://www.sonshi.com/sun1.html
8. http://csf.colorado.edu/mail/pen-l/aug99/msg01761.html
9. http://www.manhattan-institute.org/html/cci.htm
10. http://www.d-n-i.net/second_level/fourth_generation_warfare.htm
11. Networks and Netwars: The Future of Terror, Crime and Militancy.
http://www.rand.org/publications/MR/MR1382/
12. George J Stein, Information War - Cyberwar - Netwar.
http://www.airpower.maxwell.af.mil/airchronicles/battle/chp6.html
13. Timothy Shimeall, Phil Williams, Casey Dunlevy, Countering cyber war.
http://www.nato.int/docu/review/2001/0104-toc.htm
14. Michael A. Caloyannides, Mitretek Systems, Falls Church. Potentially
Catastrophic Vulnerabilities of the Internet and Proposed Remedies.
http://www.ists.dartmouth.edu/ISTS/library.htm
15. Information and Telecommunications Sector Vulnerabilities and Threats -
September 2002. http://www.ists.dartmouth.edu/ISTS/ists_docs/itsv.pdf
16. Toshi Yoshihara, Chinese Information Warfare: a Phantom Menace or Emerging
Threat? http:// www.iwar.org.uk/iwar/resources/china/iw/chininfo.pdf
17. http://www.stratcom.af.mil/factsheetshtml/jtf-cno.htm
18. http://www.house.gov/hasc/openingstatementsandpressreleases/107thcongress/01
-05-17bryan.html
19. http://www.iwar.org.uk/iwar/resources/usaf/maxwell/students/2001/01-003.pdf
20. 'Washington Post' Friday, February 7, 2003; Page A01
Search WWH ::




Custom Search