Cyberwar

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 846 Experts worldwide ranked by ideXlab platform

Teguh Hidayat Iskandar Alam - One of the best experts on this subject based on the ideXlab platform.

  • reverse engineering analysis forensic malware webc2 div
    KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), 2018
    Co-Authors: Raditya Faisal Waliulu, Teguh Hidayat Iskandar Alam
    Abstract:

    At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (Cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware. Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler

  • reverse engineering analysis forensic malware webc2 div
    SinkrOn, 2018
    Co-Authors: Raditya Faisal Waliulu, Teguh Hidayat Iskandar Alam
    Abstract:

    At this paper focus on Malicous Software also known as Malware APT1 (Advance Presistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (Cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator sucessfull user to relized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and dissambler body malware.

Rodríguez Forero Melissa - One of the best experts on this subject based on the ideXlab platform.

  • Las agencias de inteligencia y la ciberguerra contra Wikileaks, Edward Snowden y los derechos humanos
    Facultad de Ciencias Políticas y Relaciones Internacionales, 2016
    Co-Authors: Rodríguez Forero Melissa
    Abstract:

    La seguridad y la defensa son uno de los principales ejes temáticos dentro de las Relaciones Internacionales, razón por la cual se realizó una indagación sobre el respeto de los Derechos Humanos, principalmente la libertad y la privacidad, el rol de la NSA/CSS, la CIA y el FBI, la ciberguerra y la relación que existe entre los mismos, enmarcada en los casos WikiLeaks y Snowden, como problema de seguridad y defensa dentro de la esfera internacional. Por lo anterior, se realizó un análisis sobre el uso de la ciberguerra por parte de las principales Agencias de Inteligencia de Estados Unidos, como son la CIA, el FBI y la NSA. Posteriormente, se hizo una aproximación a los casos WikiLeaks y Snowden, con el fin de entender sus similitudes y diferencias para así poder comprender como en estos casos realmente afectan los Derechos Humanos, especialmente la libertad y la privacidad. Finalmente, se realizó un análisis sobre el debate que existe entre libertad y seguridad, con el fin de aproximarse a las realidades sociales y políticas que existen en la comunidad internacional actualmente. Así, se procuró comprender como las principales agencias de inteligencia de Estados Unidos en pro de garantizar su seguridad nacional mediante la ciberguerra afectaron algunos derechos humanos como son la libertad y la privacidad.Security and defense are one of the main thematic areas within International Relations, which is why an inquiry was made on respect for Human Rights, mainly freedom and privacy, the role of the NSA / CSS, the CIA and the FBI, Cyberwar and the relationship that exists between them, framed in the cases WikiLeaks and Snowden, as a security and defense problem within the international sphere. Therefore, an analysis was made of the use of Cyberwar by the main US intelligence agencies, such as the CIA, the FBI and the NSA. Later, an approximation was made to the WikiLeaks and Snowden cases, in order to understand their similarities and differences to comprehend how they really affect human rights, especially freedom and privacy. Finally, an analysis was made of the debate between freedom and security, in order to approach the social and political realities that exist in the international system. Thus, the main objective was to understand how the main intelligence agencies of the United States, in order to guarantee their national security through the Cyberwar affected some human rights as were the cases of freedom and privacy.InternacionalistaPregrad

  • Las agencias de inteligencia y la ciberguerra contra Wikileaks, Edward Snowden y los derechos humanos
    Relaciones Internacionales, 2016
    Co-Authors: Rodríguez Forero Melissa
    Abstract:

    La seguridad y la defensa son uno de los principales ejes temáticos dentro de las Relaciones Internacionales, razón por la cual se realizó una indagación sobre el respeto de los Derechos Humanos, principalmente la libertad y la privacidad, el rol de la NSA/CSS, la CIA y el FBI, la ciberguerra y la relación que existe entre los mismos, enmarcada en los casos WikiLeaks y Snowden, como problema de seguridad y defensa dentro de la esfera internacional. Por lo anterior, se realizó un análisis sobre el uso de la ciberguerra por parte de las principales Agencias de Inteligencia de Estados Unidos, como son la CIA, el FBI y la NSA. Posteriormente, se hizo una aproximación a los casos WikiLeaks y Snowden, con el fin de entender sus similitudes y diferencias para así poder comprender como en estos casos realmente afectan los Derechos Humanos, especialmente la libertad y la privacidad. Finalmente, se realizó un análisis sobre el debate que existe entre libertad y seguridad, con el fin de aproximarse a las realidades sociales y políticas que existen en la comunidad internacional actualmente. Así, se procuró comprender como las principales agencias de inteligencia de Estados Unidos en pro de garantizar su seguridad nacional mediante la ciberguerra afectaron algunos derechos humanos como son la libertad y la privacidad.Security and defense are one of the main thematic areas within International Relations, which is why an inquiry was made on respect for Human Rights, mainly freedom and privacy, the role of the NSA / CSS, the CIA and the FBI, Cyberwar and the relationship that exists between them, framed in the cases WikiLeaks and Snowden, as a security and defense problem within the international sphere. Therefore, an analysis was made of the use of Cyberwar by the main US intelligence agencies, such as the CIA, the FBI and the NSA. Later, an approximation was made to the WikiLeaks and Snowden cases, in order to understand their similarities and differences to comprehend how they really affect human rights, especially freedom and privacy. Finally, an analysis was made of the debate between freedom and security, in order to approach the social and political realities that exist in the international system. Thus, the main objective was to understand how the main intelligence agencies of the United States, in order to guarantee their national security through the Cyberwar affected some human rights as were the cases of freedom and privacy

Costescu, Dragos Nicolae - One of the best experts on this subject based on the ideXlab platform.

  • Los ciberataques: una noción sin tipificación, pero con un futuro
    'Universidade da Coruna', 2019
    Co-Authors: Lazar Elena, Costescu, Dragos Nicolae
    Abstract:

    This paper attempts to delineate and define the notion of cyberattack in the context of international law. In this sense, we want to emphasize the lack of a clear legal framework to regulate this notion. Finally, we will address the issue of Cyberwar in international humanitarian lawEste documento intenta delinear y definir la noción de ciberataque en el contexto del Derecho internacional. En este sentido, queremos enfatizar la falta de un marco legal claro para regular esta noción. Finalmente, abordamos el tema de la ciberguerra en el Derecho internacional humanitari

  • Los ciberataques: una noción sin tipificación, pero con un futuro
    Universidade da Coruña Servizo de Publicacións, 2018
    Co-Authors: Lazar Elena, Costescu, Dragos Nicolae
    Abstract:

    [Resumen] Este documento intenta delinear y definir la noción de ciberataque en el contexto del Derecho internacional. En este sentido, queremos enfatizar la falta de un marco legal claro para regular esta noción. Finalmente, abordamos el tema de la ciberguerra en el Derecho internacional humanitario[Abstract] This paper attempts to delineate and define the notion of cyberattack in the context of international law. In this sense, we want to emphasize the lack of a clear legal framework to regulate this notion. Finally, we will address the issue of Cyberwar in international humanitarian la

Saalbach Klaus - One of the best experts on this subject based on the ideXlab platform.

  • Cyberwar Methods and Practice
    2020
    Co-Authors: Saalbach Klaus
    Abstract:

    Cyberwar (Cyber war, Cyber Warfare) is the military confrontation with the means of information technology. This paper presents the current state and deals with the theoretical and practical problems. In practice, Cyberwar is an integral part of military action, but cannot be completely separated from espionage, since the intrusion into and reconnaissance of target systems is essential for further action. After an overview of attack methods, attackers (Advanced Persistent Threats), spy tools, cyber weapons and cyber defense, a particular focus is on the attribution of cyber-attacks and the Smart Industry (Industry 4.0). Afterwards, the Cyberwar strategies of the US, China, Russia and further leading actors will be discussed. Further chapters present Artificial Intelligence, Smart Industry, smart devices and biological applications

  • Cyberwar Grundlagen Methoden Beispiele
    2020
    Co-Authors: Saalbach Klaus
    Abstract:

    Der Cyberwar (Cyberkrieg) ist die kriegerische Auseinandersetzung mit den Mitteln der Informationstechnologie. Dieses Arbeitspapier unternimmt eine aktuelle Bestandsaufnahme und geht auf die theoretischen und praktischen Probleme ein. In der Praxis ist der Cyberwar ein integraler Bestandteil militärischen Handelns, lässt sich jedoch nicht ganz von der Spionage trennen, da das Eindringen in und Aufklären von gegnerischen Systemen wesentlich für das weitere Vorgehen ist. Nach einem Überblick über Angriffsmethoden, Angreifer (Advanced Persistent Threats), Spionagetools, Cyberwaffen und der Cyberverteidigung liegt ein besonderes Augenmerk auf der Einordnung von Cyberangriffen (Attribution) und der Smart Industry (Industrie 4.0). Anschließend werden die Cyberwar-Strategien der USA, Chinas, Russlands und weiterer führender Akteure besprochen. Weitere Kapitel befassen sich der Künstlichen Intelligenz, der Smart Industry, smarten Systemen und biologischen Anwendungen

  • Cyberwar Grundlagen Methoden Beispiele
    2019
    Co-Authors: Saalbach Klaus
    Abstract:

    Cyberwar (Cyber war, Cyber warfare) is the military confrontation with the means of information technology. This paper presents the current state and deals with the theoretical and practical problems. In practice, Cyberwar is an integral part of military action, but cannot be completely separated from espionage, since the intrusion into and reconnaissance of target systems is essential for further action. After an overview of attack methods, attackers (Advanced Persistent Threats), spy tools, cyber weapons and cyber defense, a particular focus is on the attribution of cyber attacks and the Smart Industry (Industry 4.0). Afterwards, the Cyberwar strategies of the US, China, Russia and further leading actors will be discussed. A final chapter deals with biological applications

  • Cyberwar Methods and Practice
    2019
    Co-Authors: Saalbach Klaus
    Abstract:

    Der Cyberwar (Cyberkrieg) ist die kriegerische Auseinandersetzung mit den Mitteln der Informationstechnologie. Dieses Arbeitspapier unternimmt eine aktuelle Bestandsaufnahme und geht auf die theoretischen und praktischen Probleme ein. In der Praxis ist der Cyberwar ein integraler Bestandteil militärischen Handelns, lässt sich jedoch nicht ganz von der Spionage trennen, da das Eindringen in und Aufklären von gegnerischen Systemen wesentlich für das weitere Vorgehen ist. Nach einem Überblick über Angriffsmethoden, Angreifer (Advanced Persistent Threats), Spionagetools, Cyberwaffen und der Cyberverteidigung liegt ein besonderes Augenmerk auf der Einordnung von Cyberangriffen (Attribution) und der Smart Industry (Industrie 4.0). Anschließend werden die Cyberwar-Strategien der USA, Chinas, Russlands und weiterer führender Akteure besprochen. Ein abschließendes Kapitel befasst sich mit biologischen Anwendungen

  • Vortrag Cyberwar
    2019
    Co-Authors: Saalbach Klaus
    Abstract:

    Cyberwar (cyber warfare) is the military conflict with the means of the information technology. The presentation gives an up-to-date overview and deals with the theoretical and practical problems. In practice, Cyberwar is an integral part of military action, but cannot be completely separated from espionage, since the intrusion into and surveillance of intruded systems is essential for further action. After reviewing attacking methods, cyber weapons and the cyber defenses, the paper focuses on the attribution of cyber-attacks and the Smart Industry (Industry 4.0), which is increasingly becoming a field of action for advanced cyber-attacks

Raditya Faisal Waliulu - One of the best experts on this subject based on the ideXlab platform.

  • reverse engineering analysis forensic malware webc2 div
    KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), 2018
    Co-Authors: Raditya Faisal Waliulu, Teguh Hidayat Iskandar Alam
    Abstract:

    At this paper focus on Malicous Software also known as Malware APT1 (Advance Persistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (Cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator successfull user to realized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware. Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler

  • reverse engineering analysis forensic malware webc2 div
    SinkrOn, 2018
    Co-Authors: Raditya Faisal Waliulu, Teguh Hidayat Iskandar Alam
    Abstract:

    At this paper focus on Malicous Software also known as Malware APT1 (Advance Presistent Threat) codename WEBC2-DIV the most variants malware has criteria consists of Virus, Worm, Trojan, Adware, Spyware, Backdoor either Rootkit. Although, malware could avoidance scanning antivirus but reverse engineering could be know how dangerous malware infect computer client. Lately, malware attack as a form espionage (Cyberwar) one of the most topic on security internet, because of has massive impact. Forensic malware becomes indicator sucessfull user to relized about malware infect. This research about reverse engineering. A few steps there are scanning, suspected  packet in network and analysis of malware behavior and dissambler body malware.