| 000 | 01720nam a22002057a 4500 | ||
|---|---|---|---|
| 008 | 120326t xxu||||| |||| 00| 0 eng d | ||
| 040 |
_aES-MaBCA _cES-MaBCA |
||
| 100 |
_92439 _aTheohary, Catherine A. |
||
| 100 |
_913356 _aW. Rollins, John |
||
| 245 |
_aCyberwarfare and Cyberterrorism _h[Recurso electrónico] PDF _b: In Brief |
||
| 260 |
_bCongressional Research Service _cMarch 2015 |
||
| 300 | _aRecurso online, 12 p. | ||
| 520 | _aRecent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyberterrorism. Cyberwar is typically conceptualized as state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force. Cyberterrorism can be considered “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” Cybercrime includes unauthorized network breaches and theft of intellectual property and other data; it can be financially motivated, and response is typically the jurisdiction of law enforcement agencies. Within each of these categories, different motivations as well as overlapping intent and methods of various actors can complicate response options. | ||
| 650 | 0 |
_91739 _aTerrorismo _xCiberterrorismo |
|
| 650 | 0 |
_91698 _aSeguridad en las Tecnologías |
|
| 650 | 0 |
_91708 _aDelitos informáticos |
|
| 650 | 0 |
_91685 _aCiberactivismo |
|
| 856 | 4 |
_uhttp://fas.org/sgp/crs/natsec/R43955.pdf _qPDF |
|
| 942 |
_2udc _cBK |
||
| 999 |
_c16489 _d16492 |
||