Cyber Operations

Results: 233



#Item
131Military science / Electronic warfare / Military technology / Military organization / United States Cyber Command / Department of Defense Cyber Crime Center / Stuxnet / Computer network operations / Twenty-Fourth Air Force / Cyberwarfare / Computer crimes / Hacking

Awaiting Cyber 9/11 By C l i f f o r d S . M ag e e E

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2014-08-28 11:33:52
132Information operations / War / Electronic warfare / Hacking / Information warfare / Computer network operations / Chinese Information Operations and Information Warfare / Cyber Operations / Cyberwarfare / Military science / Military intelligence

Microsoft Word - FINAL_USCC_PRC_Cyber_Capabilities_Study.docx

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:31:58
133Electronic warfare / Military / United States Department of Homeland Security / Computer crimes / Security engineering / Cyberterrorism / Cyber Operations / National Infrastructure Protection Plan / Chinese Information Operations and Information Warfare / Cyberwarfare / Military science / National security

ASYMMETRIC THREAT GLOBAL SNAPSHOT AUGUST 2014 Combatting Asymmetric Threats: Dominating the EMS, Defending the Homeland For the past 13 years, the U.S. has been engaged in a counterinsurgency and counter-terrorism fight

Add to Reading List

Source URL: asymmetricthreat.net

Language: English - Date: 2014-08-28 15:19:44
134Business / Risk management / Project management / Security / Cyberwarfare / Risk / Aon Corporation / Actuarial science / Management / Ethics

Introducing the Cyber Risk Diagnostic Tool Few – if any – industry sectors are immune from a cyber attack. The digital interconnectivity of business operations, suppliers and customers means that any organization is

Add to Reading List

Source URL: www.aon.com

Language: English - Date: 2014-04-23 12:54:43
135Military / War / Computer network operations / Hacking / Military technology / CNO / Information warfare / Computer science / Cyber Operations / Military science / Electronic warfare / Cyberwarfare

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:28:59
136Information operations / Mind control / Propaganda in the United States / Psychological Operations / Propaganda / Information warfare / Public Diplomacy / United States Army Civil Affairs and Psychological Operations Command / Military journalism / Psychological warfare / Crowd psychology / Propaganda techniques

Influence Operations and the Internet: A 21st Century Issue Legal, Doctrinal, and Policy Challenges in the Cyber World Col Rebecca A. Keller, USAF* The conduct of information operations (IO) by the US military,

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:22:29
137Net-centric / Military communications / Intent / United States Cyber Command / Battlespace / SIPRNet / Defense Information Systems Agency / Military science / Military / Command and control

U.S. and Angolan airmen discuss unloading C-130J Super Hercules as part of African Partnership Flight with Angolan and Zambian air forces (U.S. Air Force/Benjamin Wilson) Conducting Operations in a

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2014-08-18 10:41:58
138United States Cyber Command / United States Strategic Command / Military / Net-centric / Military organization / Cyberinfrastructure

UNCLASSIFIED JIE Operations and Cyber C2 Mr. Scott Rodakowski, DISA Operations COL Rich Price, Cdr DISA EUCOM

Add to Reading List

Source URL: www.afcea.org

Language: English - Date: 2014-05-15 14:13:32
139Information operations / National security / Electronic warfare / Information warfare / Computer network operations / Cyber Operations / United States Strategic Command / Psychological Operations / Cyber electronic warfare / Cyberwarfare / Military science / Military

GAO[removed], ELECTRONIC WARFARE: DOD Actions Needed to Strengthen Management and Oversight

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2012-07-09 14:35:08
140Computing / Windows / Operating system / Microsoft Office / Workstation / Computer security / AutoRun / Windows XP editions / Microsoft Windows / Software / Windows XP

CYBER SECURITY OPERATIONS CENTRE JULY[removed]U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES TO ASD SHO

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-10-15 22:23:57
UPDATE