drama. Drama is the touchstone of the report. In order to capture the virtual realistic impression, we must carefully observe this special stone. We even have to look at it to find out what Cyber War is or how to define it.
When talking about cyber warfare, exaggeration and metaphor are rules, not exceptions. Network World – Network World – You may have noticed that the virtual world is occupied by nouns and verbs in the material world. The images of the online world in news often have dramatic physical images rather than the electrons that make up the online world. Coin images exist in stories of pure virtual cryptocurrencies, such as BitCoin. Perhaps the physics journals that readers are really interested in in mathematics in electronics and networking are exceptions to this rule.
However, when we read the story of cyber warfare, we will see pictures of soldiers, guns and supplies accompanying the story. When we read that people sitting at their desks and computers came up with hacking instead of being hacked, we called them "cyber warriors" and wore photos of men wearing bulletproof jackets and helmets. I don't know what Cyber Item will have photos of tanks and bombers.
In addition to vivid illustrations and photos, what is cyber warfare? In 2010, former President Cyber Security Special Advisor Richard Clarke defined cyber warfare as "the act of a nation-state invading a computer or network in another country for the purpose of destruction or destruction." The salient point is that a nation state must be identified as a perpetrator. If this is true, then we have obviously participated in the cyber wars that have been going on for years, coming and going in China, Russia, the United States, Israel, Georgia, Ukraine, South Korea, Syria, Iran, Estonia and other countries. Although countries have always denied this, there are clear indicators that are tantamount to demonstrating that these countries have placed their digital attackers on each other's networks, computers and data. The above network, computer and data were subsequently damaged.
Therefore, it is certain that there is a cyber attack between countries. But is this a cyber war? Dr. Thomas Rid, Professor of Security Studies at King's College, said there was no cyber war. He tends to define cyber warfare based on physical infrastructure disasters—in this case, water “stops flowing, lights go out, trains derail, banks lose our financial records, roads get chaotic, elevators fail, and planes fall from the sky”. He said that this will not happen. In fact, he has a 2013 book called "Network Wars Will Not Occur".
Others are not so optimistic about this topic and possibilities. In the United States, cyber command budgets are soaring in the face of declining government spending in most regions. Its year-on-year growth rate has almost doubled: $118 million in 2012, $212 million in 2013, and $447 million in 2014. This requires buying a lot of electronics, lots of code and lots of network warriors [no jackets]. . These increases have led to similar results, albeit differently than the dramatic expansion of network budgets in other countries.
After mastering all the web tools and creating them, would anyone want to use them? Cyber war is inevitable, or is there a way out? Ethics experts are taking this issue seriously. Big thinkers such as Patrick Lin, Fritz Alhoff, and Neil C. Rowe have co-authored several articles, such as "Is it possible for a cyber war to wage war?" And "War 2.0: Cyber Weapons and Ethics" to explore alternatives. There is [regular] warfare law and there must be similar cyber conflict guidelines. It was too early yesterday to start studying these issues seriously.
When we try to answer the phrase as the title of this article, it must be spread throughout the map, because like this article, cyberwar is defined throughout the map. In fact, it does spread all over the world. The definition of cyber warfare varies by country and organization. The title [Full metaphor is flying], "Wild West of Cyber War" attempts to solemnly express different views on this subject, despite the title. Its discussion is useful, but its conclusion must be uncertain.
The 302-page Tallinn Handbook is the result of a three-year study by experts on this topic, which attempts to set such definitions. It can be read free of charge. However, not all potential parties to a network conflict follow the conclusions drawn here.
So, what is the best answer to the cyber war situation in the world? Cyber attacks are prevalent throughout the world. They are performed by multiple state participants and stateless participants. These acts are carried out by State actors who shirk their responsibilities to other countries and stateless actors who claim no control or commitment to these acts but are politically consistent. They are carried out by hacking people who seek political change by disabling or destroying sites, networks and information. They are carried on by people with pure profit motives. They are made by newcomers who just find happiness in a slight mess.
All such attacks are increasing, although most attacks are still relatively simple, such as Distributed Denial of Service [DDoS]. However, there is little evidence that the way the physical infrastructure is affected is greatly affected. There is little evidence that people are personally injured by such attacks. It is not clear whether such events will actually happen.
Dr. Reed said they would not. Dr. Lin, Alhoff and Rowe point out the path to avoid such injuries. Richard Clarke and former Defense Secretary Leon Panetta say this is inevitable and we must be prepared – spending hundreds of millions of dollars.
Albert Einstein has a famous saying: "You can't prevent and prepare for war at the same time." Let us hope that in the case of cyber war, he is wrong.