[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FYI] Cyberwar & Cyberpeace
- To: debate@fitug.de
- Subject: [FYI] Cyberwar & Cyberpeace
- From: Horns@t-online.de (Axel H. Horns)
- Date: Tue, 4 May 1999 09:34:01 +0100
- Comment: This message comes from the debate mailing list.
- Organization: Private Site
- Reply-to: horns@t-online.de
- Sender: owner-debate@fitug.de
http://jya.com/iw-ct.htm
------------------------------- CUT -------------------------------
3 May 1999: See related paper by Benjamin, Gladman and Randell:
http://www.cs.ncl.ac.uk/research/trs/papers/631.ps
1 May 1999
From: khushil.dep@cyberlife.co.uk
To: ukcrypto@maillist.ox.ac.uk
Subject: RE: Information Warfare, Cyber Terrorism, ...
Date: Fri, 30 Apr 1999 16:20:30 +0100
Looks like an interesting talk, however I won't be able to attend. If
anyone going would are to make a transcript I'd love to take a peek.
:-P
***
Khushil Dep
Product Tester
CyberLife Technology Ltd
-----Original Message-----
From: owner-ukcrypto@maillist.ox.ac.uk
[mailto:owner-ukcrypto@maillist.ox.ac.uk] On Behalf Of Brian Randell
Sent: 30 April 1999 15:38 To: ukcrypto@maillist.ox.ac.uk
Subject: Information Warfare, Cyber Terrorism, ...
UNIVERSITY OF NEWCASTLE UPON TYNE
DEPARTMENT OF COMPUTING SCIENCE
COLLOQUIUM
Tuesday 4 May 1999
at
2.30 pm
Information Warfare, Cyber Terrorism and
Computer Crime, Threats and Defences
by
Dr Ralph Benjamin
Consultant and Visiting Professor at Imperial College. Dr. Benjamin's
earlier positions have been as Director and Chief Scientist, Admiralty
Underwater-Weapons Establishment, Superintendent Director and Chief
Scientist, GCHQ and Head of Communications Techniques and
Networks,Nato Supreme HQ.
ABSTRACT:
The talk will briefly consider some of the evidence that there is a
real problem, and how it could affect various aspects of the fabric
of the nation. It will then indicate the essential commonalities
between Information Warfare and Computer Crime - and intermediate
scenarios - particularly as regards interconnected systems serving
significant operations. It will outline the types of threat, their
nature and their trends. The main part of the talk will then deal
with the various architectural and other technical, cryptographic,
procedural and administrative actions, which jointly can hopefully
contain the threat, and it will indicate how their relative priorities
might be determined. Conclusions will summarise the nature of the
threat and defences and the action required.
***************
The lecture will be in room 831, 8th Floor, Claremont Tower, Tea and
biscuits will be served in the Common Room (Room 924) after the talk.
Dept. of Computing Science, University of Newcastle, Newcastle upon
Tyne, NE1 7RU, UK EMAIL = Brian.Randell@newcastle.ac.uk PHONE = +44
191 222 7923 FAX = +44 191 222 8232 URL =
http://www.cs.ncl.ac.uk/~brian.randell/
------------------------------- CUT -------------------------------