Cyberspace: Definition and Implications

被引:0
作者
Ottis, Rain [1 ]
Lorents, Peeter [1 ]
机构
[1] Cooperat Cyber Def Ctr Excellence, Tallinn, Estonia
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2010年
关键词
Cyberspace; cyber conflicts; cyber attacks; time; definition;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years the term "cyber" has been used to describe almost anything that has to do with networks and computers, especially in the security field. Another emerging field of study is looking at conflicts in cyberspace, including state-on-state cyber warfare, cyber terrorism, cyber militias etc. Unfortunately, however, there is no consensus on what "cyberspace" is, let alone what are the implications of conflicts in cyberspace. In order to clarify this situation, we offer the following definition: cyberspace is a time-dependent set of interconnected information systems and the human users that interact with these systems. We describe the background of the definition and show why this approach may be preferable over others. Specifically, we revisit the terms coined by Norbert Wiener (the father of cybernetics) and William Gibson. We show that time-dependence is an overlooked aspect of cyber space and make a case for including it in our proposed definition. In addition, we look at the implications that can be drawn from the time-dependence of cyberspace, especially in regard to cyber conflicts, which we define as a confrontation between two or more parties, where at least one party uses cyber attacks against the other(s). Specifically we review the implications on the potential for rapid deployments of offensive and defensive actions in cyberspace, the feasibility of mapping cyberspace, and the need for constant patrolling and reconnaissance.
引用
收藏
页码:267 / 270
页数:4
相关论文
共 13 条
[1]  
[Anonymous], J HIST BEHAV SCI
[2]  
Deza E., 2006, Dictionary of Distances
[3]  
Gibson W., 1984, Neuromancer
[4]  
International Telecommunication Union, 2009, MEAS INF SOC
[5]  
KURATOWSKI K, 2009, TOPOLOGY
[6]  
LORENTS P, 2001, INFORMAATIKA TEOREET
[7]  
Lorents P, 2009, LECT NOTES COMPUT SC, V5623, P180, DOI 10.1007/978-3-642-02767-3_20
[8]  
MOORE D, 2003, IEEE SECUR PRIV, V39, P1
[9]  
OTTIS R, 2008, P 7 EUROPEAN C INFOR, V7, P163
[10]  
Ottis R, 2009, PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, P177