Show simple item record

dc.contributor.authorDragoo, Holly M.
dc.date.accessioned2017-11-28T20:24:39Z
dc.date.available2017-11-28T20:24:39Z
dc.date.issued2017-11-17
dc.identifier.urihttp://hdl.handle.net/1853/59006
dc.descriptionPresented on November 17, 2017 at 12:00 p.m. in the Klaus Advanced Computing Building, Room 1116W.en_US
dc.descriptionHolly Dragoo is a research associate with the Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratory at the Georgia Tech Research Institute. Her previous work with the U.S. Department of Defense and Federal Bureau of Investigation give her a unique understanding of intelligence community requirements. Dragoo’s research interests include cybersecurity policy issues, threat attribution, metadata analysis, and adversarial network reconstruction.en_US
dc.descriptionRuntime: 55:22 minutesen_US
dc.description.abstractIs cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the challenges of why it’s so hard for military doctrine to classify acts of aggression in cyberspace.en_US
dc.format.extent55:22 minutes
dc.language.isoen_USen_US
dc.publisherGeorgia Institute of Technologyen_US
dc.relation.ispartofseriesCybersecurity Lecture Seriesen_US
dc.subjectCybersecurityen_US
dc.subjectCyber warfareen_US
dc.subjectMilitary operationsen_US
dc.titleWhat Constitutes an Act of War in Cyberspace?en_US
dc.typeLectureen_US
dc.typeVideoen_US
dc.contributor.corporatenameGeorgia Institute of Technology. Institute for Information Security & Privacyen_US
dc.contributor.corporatenameGeorgia Tech Research Institute. Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratoryen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record