{"id":1,"date":"2014-01-15T19:47:10","date_gmt":"2014-01-15T19:47:10","guid":{"rendered":"http:\/\/www.volucer.it\/?p=1"},"modified":"2023-10-14T07:54:42","modified_gmt":"2023-10-14T07:54:42","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/www.volucer.it\/?p=1","title":{"rendered":"The Control of the Cyberspace"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>\u201c<em>We are living in a global world.<\/em>\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>In the cyberspace many things are going to happen. Cyberspace is not a parallel world but it is wired to the real world and it is made up of Internet and whatever is connected to it (<b>Internet of Things<\/b> or <b>IoT<\/b> for short).<\/p>\n<p><span style=\"line-height: 1.714285714; font-size: 1rem;\">Cyberspace is become the new battle space where many actors fight their cyber war. The design of Internet and flaws in software and hardware make it possible.<\/span><\/p>\n<p>Many countries are developing <em>cyberweaponary<\/em> to use to cyber strikes, espionage or in retaliation against major cyber attacks.<\/p>\n<p>Cybercriminal groups operate in the cyberspace to easily gain money and illegal profits and so on.<\/p>\n<p>As a consequence we have two types of figure:<\/p>\n<ol>\n<li><em>Cyber warriors<\/em>: generally hackers that work for a \"military\" regular structure of a country;<\/li>\n<li><em>Cybercriminals<\/em>: hackers that do something like going where are \"not authorized\" breaking the laws.<\/li>\n<\/ol>\n<p>Both of them can carry out searches of faraway attacks or release logic bomb in any \"virtual place\" in the world. The name of these logic bombs are viruses, worms and phishing scams and so on that we can identify with an only word \"<em>malware<\/em>\".<\/p>\n<p>About the cyber warfare we can measure the cyber war strength of a nation using a group of indicators which we can see in the following table.<\/p>\n<p>Cyber War Strength<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td colspan=\"2\" valign=\"top\" width=\"636\"><strong>\u00a0Cyber War Strength<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"168\"><strong>\u00a0 Indicator<\/strong><\/td>\n<td valign=\"top\" width=\"468\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"168\">\u00a0 <em>Cyber Offence<\/em><\/td>\n<td valign=\"top\" width=\"468\">It is the action by a nation-state to penetrate another nation\u2019s computer s or networks for the purposes of causing damage or disruption.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"168\">\u00a0 <em>Cyber Espionage<\/em><\/td>\n<td valign=\"top\" width=\"468\">It is the act or practice of obtaining secrets without the permission of the holder of the information for a strategic advantage.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"168\">\u00a0 <em>\u00a0Cyber Sabotage<\/em><\/td>\n<td valign=\"top\" width=\"468\">It is the act or practice of modifying secrets without the permission of the holder of the information for a strategic advantage.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"168\"><em>\u00a0 Cyber Defence<\/em><\/td>\n<td valign=\"top\" width=\"468\">The ability to take actions that under attack will block or mitigate the attack.<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"168\">\u00a0<em>Cyber Dependence<\/em><\/td>\n<td valign=\"top\" width=\"468\">It is the grade a nation is wired, reliant upon networks and systems that could be vulnerable in the event of cyber war attack.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>References<\/strong><\/p>\n<ol start=\"1\">\n<li>Richrad A. Clarke and Robert K. Knake, <em>Cyber War<\/em>, HarperCollins 2010;<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; \u201cWe are living in a global world.\u201d &nbsp; In the cyberspace many things are going to happen. Cyberspace is not a parallel world but it is wired to the real world and it is made up of Internet and whatever is connected to it (Internet of Things or IoT for short). Cyberspace is become <a class=\"read-more\" href=\"https:\/\/www.volucer.it\/?p=1\">...continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/posts\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.volucer.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1"}],"version-history":[{"count":7,"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":42,"href":"https:\/\/www.volucer.it\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions\/42"}],"wp:attachment":[{"href":"https:\/\/www.volucer.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.volucer.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.volucer.it\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}