Cyberpower Exercise in Cyberspace
DOI:
https://doi.org/10.18667/cienciaypoderaereo.575Keywords:
Cyber power, cyberspace, cyber security, information, multidimensional spectrum.Abstract
Nowadays technology moves faster than it can be imagined. Evidence of such is that every factor of human life is in cyberspace in a database showing on political, military, security, economic, social and (even) personal affairs.Information is the raw material used in cyberspace, and it is also a valuable instrument for satisfying any interest, as well as to achieve cyber power. With this new way of applying power, needed information can be obtained in order to fulfil any request and enforce a will. In the last years, security and defense of the states have made great advances in technology to exert their will more efficiently by means of cyber-power.
However, in the same way as cyber power can be exerted in accordance with a will, a great number of actors may exert it for their own sake in cyberspace. New threats are inevitable, thus being prepared in this multidimensional field is an obligation in order to avoid vulnerability and consequences that may arise due to an attack from cyberspace.
Downloads
References
Actualidad RT. (2014). Vencer sin matar: las armas electromagnéticas de Rusia, [en línea] Recuperado de: http://actualidad.rt.com/actualidad/view/141707-armas-electromagneticas-rusia-guerra-radioelectronica
Alfonso, J. (2015). Ataques entre estados mediante Internet. Estudio de casos orientados por el Esquema Nacional de Seguridad. Tesis no publicada, [en línea] Recuperado de: https://riunet.upv.es/bitstream/handle/10251/56042/Memoha.pdf?sequence=1
Arreola, J. (2016) Clberseguridad (casi) a prueba del enemigo 'invisible'. Revista Forbes México, [en línea] Recuperado de: https://www.forbes.com.mx/ciberseguridad-casi-prueba-del-enemigo-invisible/#gs.cSeDvT4
Armitage, R.; Nye, J. (2007). CS/S Commission On Smart Power. Washington, D.C.:The CSIS Press.
Berrlo, L. (2012). El Hacking Etico y los Grupos Hackitivistas Anonymous y Lulzsec. [en línea] Recuperado de: http://www.dsteamseguridad.com/archivos/hackconf/Anonympus_Remington.pdf
Bobblo, N.; Matteucci, N (1982). Diccionario de ciencia política. Editorial Siglo XXI: Madrid.
Department of Homeland Security. (2013). National Security Cyberspace. Washington D.C. Recuperado de: https://www.us-cert.gov/sites/default/files/publications/cyberspace_strategy.pdf.
Gazeta, Rosslyskaya. (2014). Cultura/Technologias: Russia Beyond The Headlines. Recuperado el 12 de 02 de 2015, de sitio Web Russia Beyond The Headlines: https://es.rbth.com/cultura/2014/06/04/solzhemtsyn_previo_los_acontecimientos_de_ucrania_40621
Llbickl, M. C. (2009). Cyberdeterrence And Cyberwar. Washington D.C.: Library of Congress.
Mullen, J. (2014). Corea del Norte y Sony: se intensifica la guerra de palabras. CNN en Español, [en línea] Recuperado de: http://cnnespanol.cnn.com/2014/12/22/corea-del-norte-y-sony-se-intensifica-la-guerra-de-palabras/
Palacios, R. (2009). ¿Se están utilizando ya armas psicotrónicas? Discovery Dsalud. [en línea] Recuperado de: https://www.dsalud.com/reportaje/se-estan-utilizando-ya-armas-psicotronicas/
Parker, K. L. (2014). El uso del ciberpoder. Military Review. 69(3) pp. 50-59. [en línea] Recuperado de: https://view.joomag.com/military-review-edici%C3%B3n-hispano-americana-mayo-agosto-2014/0905477001410196776?page=59
Toro Ibacache, L. (2009). El Enfogue Multidimensional De La Seguridad Hemisférica: Una Revisión Al Discurso Hegemónico. Revista Estudios Latinoamericanos. 1 (2) 80-91.
Vásguez, A. N. (2012). El terrorismo y el Derecho Internacional: Los ciber ataques y la guerra justal en el marco del Derecho Internacional. Buenos Aires
Downloads
Published
Issue
Section
License
Assignment of Copyrights
Authors assign Ciencia y Poder Aéreo journal the exclusive rights (reproduction, distribution, public communication, and transformation) to exploit and commercialize their work, in whole or in part, in all the formats and modalities of present or future exploitation, in all languages, throughout the life of the work and throughout the world.
All contents published in Ciencia y Poder Aéreo journal are licensed under a Creative Commons Attribution 4.0 International License, whose complete information is available at http://creativecommons.org/licenses/by/4.0/
Under the terms of this license, users are free to download, print, extract, archive, distribute and publicly communicate the content of articles, provided that proper credit is granted to authors and Ciencia y Poder Aéreo, scientific journal of the Graduate School of the Colombian Air Force. Except when otherwise indicated, this site and its contents are licensed under a Creative Commons Attribution 4.0 International License.
For other uses not considered under this license it is required to contact the Director or the Editor of the journal at the e-mail address cienciaypoderaereo1@gmail.com.
The Graduate School of the Colombian Air Force and this publication are not responsible for the concepts expressed in the articles, including the metadata or the affiliation stated by authors. This is the full responsibility of the authors.