On Cyber Threats and Information Warfare
Players, means and methods
Just as in the physical world, most of us behave well and legally in cyber- space, but some people – quite a few looking at the great number of users connected to the Internet – act as criminals from a judicial point of view. They conduct felonious and/or unethical acts in one sense or another. According to the Internet security firm Symantec, crimes on the net oc- cur as often as every third second. This involves everything from informa- tion theft, fraud and blackmail to hacker attacks. Cyberspace also makes up an area of conflict between individuals, groups and nations, with true digi- tal battles. There is a wide range of malicious players; from states and se- curity services to cybercrime organisations, terrorists and individuals that act on behalf of their own intentions and interests – or that of a client. These activities can be determined by economic, political and ideological causes. New kinds of infological weapons, such as malicious code, are con- stantly being developed. This also applies to methods for non-legitimate activities such as intrusions into computer networks or the dissemination and planting of viruses. Generally speaking, the means used are similar irrespective of the player category, while there are differences in the level of sophistication and complexity in the realisation as well as what kind of targets that are in focus for an assault. Players and antagonists There is a difference in definition of a player and an antagonist.5 Players are individuals, groups and organisations that have the capacity to...
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.Or login to access all content.