Näytä suppeat kuvailutiedot

dc.contributor.authorGunneriusson, H.
dc.contributor.authorOttis, R.
dc.date.accessioned2022-08-19T05:46:31Z
dc.date.available2022-08-19T05:46:31Z
dc.date.issued2013
dc.identifier.citationGunneriusson, H., & Ottis, R. (2013). Cyberspace from the Hybrid Threat Perspective. <i>Journal of Information Warfare</i>, <i>12</i>(3), 67-77. <a href="https://www.jinfowar.com/journal/volume-12-issue-3/cyberspace-hybrid-threat-perspective" target="_blank">https://www.jinfowar.com/journal/volume-12-issue-3/cyberspace-hybrid-threat-perspective</a>
dc.identifier.otherCONVID_148917726
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/82706
dc.description.abstractHybrid threats use conventional and unconventional means to achieve their goals. This paper explores the cyber threats as one possible aspect of hybrid threats. It describes three ways of approaching cyberspace (operations) from the hybrid threats perspective: supporting conventional operations, exploiting non-military systems, and exploring the opportunities provided by this environment. In particular, it highlights the aspects that are or likely will be relevant to the military community.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherPeregrine Technical Solutions, LLC
dc.relation.ispartofseriesJournal of Information Warfare
dc.relation.urihttps://www.jinfowar.com/journal/volume-12-issue-3/cyberspace-hybrid-threat-perspective
dc.rightsIn Copyright
dc.subject.otherhybrid threat
dc.subject.othercyberspace
dc.subject.othercyber operation
dc.subject.otherInternet
dc.subject.othermilitary
dc.titleCyberspace from the Hybrid Threat Perspective
dc.typeresearch article
dc.identifier.urnURN:NBN:fi:jyu-202208194247
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange67-77
dc.relation.issn1445-3312
dc.relation.numberinseries3
dc.relation.volume12
dc.type.versionpublishedVersion
dc.rights.copyright© Peregrine Technical Solutions, 2013
dc.rights.accesslevelopenAccessfi
dc.type.publicationarticle
dc.subject.ysokybersodankäynti
dc.subject.ysohybridisota
dc.subject.ysokyberavaruus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p27779
jyx.subject.urihttp://www.yso.fi/onto/yso/p28308
jyx.subject.urihttp://www.yso.fi/onto/yso/p7989
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright