Search For:

Displaying 1-2 out of 2 total
The Common Criteria Meets Realpolitik: Trust, Alliances, and Potential Betrayal
Found in: IEEE Security & Privacy Magazine
By Jan Kallberg
Issue Date:July 2012
pp. 50-53
The Common Criteria for Information Technology Security Evaluation aims to become a global standard for IT security certification. However, it faces challenges owing to its rigid framework, rapid technology changes, and the increased militarization of cybe...
State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks
Found in: IT Professional
By Jan Kallberg,Bhavani Thuraisingham
Issue Date:May 2013
pp. 32-35
During the last few years, several nation states have entered cyberspace in an attempt to use the Internet for policy, geopolitical, and state gains. Using development of the battle tank as an analogy, the authors explore the militarization of the Internet...