This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
May-June 2013 (vol. 11 no. 3)
pp. 88
Steven M. Bellovin, Columbia University
You can hardly read the news without seeing dire warnings of national security problems lurking in our computers. If it isn't some country stealing some other country's commercial secrets—just who's the victim and who's the thief varies with the teller, of course—it's the threat of a "cyber Pearl Harbor" or "cyberterrorism" or "cyberwarfare" or "cyberespionage" or "cyber disturbing the peace" or cybersomething-or-other. What are all of these things? Are they real? And what should "we"—one nation, or the whole world—do about them?
Index Terms:
Computer crime,Computer security,Terrorism,Cyberspace,security,Computer crime,Computer security,Terrorism,Cyberspace,espionage,Computer crime,Computer security,Terrorism,Cyberspace,attack,cyber incident,cyberincident,cyberwar,cyberthreat
Citation:
Steven M. Bellovin, "Military cybersomethings," IEEE Security & Privacy, vol. 11, no. 3, pp. 88, May-June 2013, doi:10.1109/MSP.2013.63
Usage of this product signifies your acceptance of the Terms of Use.