{"id":11484,"date":"2016-06-15T20:20:49","date_gmt":"2016-06-15T18:20:49","guid":{"rendered":"https:\/\/tuxproject.de\/blog\/?p=11484"},"modified":"2016-06-15T20:32:22","modified_gmt":"2016-06-15T18:32:22","slug":"cyberbewaffneter-cyberkonflikt","status":"publish","type":"post","link":"https:\/\/tuxproject.de\/blog\/2016\/06\/cyberbewaffneter-cyberkonflikt\/","title":{"rendered":"Cyber\u00adbe\u00adwaff\u00adne\u00adter Cyber\u00adkon\u00adflikt!"},"content":{"rendered":"<p><a href=\"http:\/\/www.zeit.de\/politik\/ausland\/2016-06\/cyberwar-nato-jens-stoltenberg-operationsgebiet\">Hur\u00adra, na end\u00adlich:<\/a><\/p>\n<blockquote><p>Die Nato hat den Cyber\u00adraum zu einem eigen\u00adst\u00e4n\u00addi\u00adgen Ope\u00adra\u00adti\u00adons\u00adge\u00adbiet erkl\u00e4rt. Angrif\u00adfe \u00fcber Daten\u00adnet\u00adze wer\u00adden nun wie sol\u00adche durch Land\u2011, See- oder Luft\u00adstreit\u00adkr\u00e4f\u00adte behan\u00addelt, sag\u00adte Gene\u00adral\u00adse\u00adkre\u00adt\u00e4r Jens Stol\u00adten\u00adberg.<\/p><\/blockquote>\n<p>Einer\u00adseits w\u00fcr\u00adde ich das Zwangs\u00adde\u00admo\u00adkra\u00adti\u00adsie\u00adren (bekannt\u00adlich in der Regel ein recht destruk\u00adti\u00adver Pro\u00adzess) von E\u2011Mail-Spam\u00admern begr\u00fc\u00ad\u00dfen, ande\u00adrer\u00adseits bedeu\u00adtet das im Wesent\u00adli\u00adchen: <b>Die NATO hat <em>dem Inter\u00adnet<\/em> den Krieg erkl\u00e4rt.<\/b> Wie schnell lan\u00addet man doch auf der fal\u00adschen Sei\u00adte, denn wel\u00adcher <em>Cyber\u00adkrie\u00adger<\/em> k\u00e4mpft schon mit offe\u00adnem Visier?<\/p>\n<p>Euer Brow\u00adser? In den H\u00e4n\u00adden der Fal\u00adschen eine gef\u00e4hr\u00adli\u00adche Waf\u00adfe. Laut dem Hacker\u00adpa\u00adra\u00adgra\u00adphen macht euch ein ein\u00adfa\u00adcher Ping schon ter\u00adror\u00adver\u00add\u00e4ch\u00adtig, k\u00fcnf\u00adtig wohl auch mit Fol\u00adgen. Passt lie\u00adber auf, wo ihr hin\u00adklickt, hier ist alles ver\u00admin\u00adtes Gel\u00e4n\u00adde. Kei\u00adne Sor\u00adge aber, wenn mor\u00adgen die Cyber\u00adwehr vor eurer T\u00fcr steht: Die schie\u00ad\u00dfen bekannt\u00adlich immer dane\u00adben.<\/p>\n<p><em>(via <a href=\"https:\/\/schwerdtfegr.wordpress.com\/2016\/06\/15\/krieg-2\/\">Schwerdt\u00adfe\u00adgr<\/a>)<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hur\u00adra, na end\u00adlich: Die Nato hat den Cyber\u00adraum zu einem eigen\u00adst\u00e4n\u00addi\u00adgen Ope\u00adra\u00adti\u00adons\u00adge\u00adbiet erkl\u00e4rt. Angrif\u00adfe \u00fcber Daten\u00adnet\u00adze wer\u00adden nun wie sol\u00adche durch Land\u2011, See- oder Luft\u00adstreit\u00adkr\u00e4f\u00adte behan\u00addelt, sag\u00adte Gene\u00adral\u00adse\u00adkre\u00adt\u00e4r Jens Stol\u00adten\u00adberg. Einer\u00adseits w\u00fcr\u00adde ich das Zwangs\u00adde\u00admo\u00adkra\u00adti\u00adsie\u00adren (bekannt\u00adlich in der Regel ein recht destruk\u00adti\u00adver Pro\u00adzess) von E\u2011Mail-Spam\u00ad\u00admern begr\u00fc\u00ad\u00dfen, ande\u00adrer\u00adseits bedeu\u00adtet das im Wesent\u00adli\u00adchen: Die NATO hat dem \u2026<\/p>\n<p><a href=\"https:\/\/tuxproject.de\/blog\/2016\/06\/cyberbewaffneter-cyberkonflikt\/\" class=\"more-link\">\u2018Cyber\u00adbe\u00adwaff\u00adne\u00adter Cyber\u00adkon\u00adflikt!\u2019 wei\u00adter\u00adle\u00adsen \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[4,13,35],"tags":[],"series":[],"class_list":["post-11484","post","type-post","status-publish","format-standard","hentry","category-politik","category-in-den-nachrichten","category-computer"],"share_on_mastodon":{"url":"","error":""},"wp-worthy-pixel":{"ignored":false,"public":null,"server":null,"url":null},"wp-worthy-type":"normal","_links":{"self":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts\/11484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/comments?post=11484"}],"version-history":[{"count":0,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/posts\/11484\/revisions"}],"wp:attachment":[{"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/media?parent=11484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/categories?post=11484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/tags?post=11484"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/tuxproject.de\/blog\/wp-json\/wp\/v2\/series?post=11484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}