Cyber Warfare Research Paper

904 Words4 Pages

1. Introductions 1.1 General introduction to the topics

“Cyber Warfare is the use of hacking to conduct the attacks on target’s or tactical resources for the purpose of espionage or sabotage.” (Forbes.com Inc, 2013). Former director of National intelligence Mike McConnel has noted, Cyber Warfare has the capacity to mirror the nuclear challenge to the world, resulting more or less economic and psychological downfall, rather than a physical one.
Jeffrey Carr describes Cyber Warfare as the art and science of fighting without fighting; of defeating an opponent without spilling their blood (Carr, 2011). The targets of Cyber Warfare are the nations, more specifically the national security/military, profit-based organizations, governmental …show more content…

Usually cyber-attack is politically motivated or by riches.
Espionage
Espionage is stealing intellectual properties and privileged information with the intention of harming and damaging the targets, like business, military and political
Cyber Weapon
Instruments developed with the series of code which can be used to attack a wide range of area from a distance in a rapid time. Conventional use of cyber weapon are
Cyber incidents
The events that take place resulting in harm, damage and malfunction of the target due to the loss of the privileged data and information.
Cyber crime
Illegal activity conducted using the internet which results in harm, damage and malfunction of the victim.
Cyber space

1.3 Brief history
Date Victim Description
1988 USA The Morris Worm infested the computers, resulting in slowing down the process and in the verge of unusable at the end.
Dec 2006 NASA Before shuttle was launched, emails with attachment were blocked in fear of being hacked.
April 2007 Estonian Government Harassed by a Denial of Service attack by foreign intruder which disrupted online …show more content…

Publically available data on internet are utilized for this purpose. Basically unauthorized access or hacking of data is not involved.
More specifically, government agents who promote online news articles and positive comments fall under IO. Terrorist group who involve in false advocacy of information, embed hidden message, and attempt to recruit the followers also use IO. Shutting off portions of the internet, filtering/blocking websites, monitoring user activities are includes in IO.
CNO
Basic requirement for CNO are computers or network and internet. CNO is further classified into three other branches, namely, Computer Network Attack (CNA), Computer Network Defence (CND) and Computer Network Exploitation (CNE).
CNA: With the use of traditional hacking tools like DDos, worms, Trojan, viruses etc the entire computer network can be disrupted, destroyed or deceived.
CND: This criteria is focused for defending the network against the attack and exploitation. CND includes spams, botnet, malwares and organized crimes.
CNE: CNE comprises of theft, eavesdropping, and setting up for attack for the exploitation of the network.
NCO
This branch of Cyber

More about Cyber Warfare Research Paper

Open Document