Skip to main content

Criteria for Comparing Cyberwarfare Capability

  • Conference paper
  • First Online:
Proceedings of the International Conference on IT Convergence and Security 2011

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 120))

  • 1339 Accesses

Abstract

We are in cyber war age. New research tries are done in the area of concept, weapons, capability, and so on for cyber war. Most nations want to know the capability and vulnerable areas for preparing cyber war. In order to get this object, we selected criteria items for comparing nations’ cyberwar capability. A few pilot nations’ capability information was gathered through open information according to the proposed criteria. The more exact interpretation and understanding for each nation’s capability including vulnerable area can be caught with the proposed criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jason S. Hardman (2006) Cyber-Terrorism, Apr 24

    Google Scholar 

  2. Bryan Krekel (2009) Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation, US-China Economic and Security Review Commission, Oct 16

    Google Scholar 

  3. US Department of Defense Office of Public Affairs (2010) US Cyber Command Fact Sheet, May 25

    Google Scholar 

  4. Technolytics, World War III : A Cyber War has begun, Sep 2007 http://www.technolytics.com/Technolytics_Cyber_War.pdf

  5. Defense Tech, China’s cyber forces, May 8, 2008

    Google Scholar 

  6. Defense Tech, Russia’s cyber forces, May 27, 2008

    Google Scholar 

  7. Defense Tech, Iranian cyber warfare threat assessment, Sep 23, 2008

    Google Scholar 

  8. infosecisland, Analysis on defense and cyber warfare, Jul 08, 2010 https://www.infosecisland.com/blogview/5160-Analysis-on-Defense-and-Cyber-arfare.html

  9. HNS News, Project Vigilant searching for volunteer hackers at Defcon, Aug 02, 2010

    Google Scholar 

  10. The white house, NICE relationship to president’s education agenda, Apr 19, 2010

    Google Scholar 

  11. Richard A. Clarke, Robert K. Knake (2010) Cyber war : the next threat to national security and what to do about it, ECC 2010, pp 147–149

    Google Scholar 

  12. Spectator, Obama administration to form new cyber war doctrine, Dec 22, 2008

    Google Scholar 

  13. NextGov, DHS completes draft of plan on how to respond to a national cyberattack, Dec 03, 2009

    Google Scholar 

  14. Attorney General Department, Cyber Storm III–Fact Sheet, Aug 2009

    Google Scholar 

  15. http://www.internetworldstats.com/am/us.htm

  16. IDATE, DigiWorld Year Book, 2009, http://www.idate.org/en/Digiworld/DigiWorld-Yearbook/2009-s-edition/2009-s-edition_43_.html

  17. Keit, A report on IT level using patent information, Dec 2009

    Google Scholar 

  18. Doctrine of the Information Security of the Russian Federation, Sep 9, 2000, http://www.medialaw.ru/e_pages/laws/project/d2-4.htm

  19. Japan Defense White paper, Part IV Reform of the Ministry of Defense p 373, 2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyung-Jun Seo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this paper

Cite this paper

Seo, HJ., Choy, YC. (2012). Criteria for Comparing Cyberwarfare Capability. In: Kim, K., Ahn, S. (eds) Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, vol 120. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2911-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2911-7_9

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2910-0

  • Online ISBN: 978-94-007-2911-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics