Preview

Cyber Warfare

Better Essays
Open Document
Open Document
896 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Warfare
Cyber Warfare
Autumn Volosin
CIS 450
20 November 2012

Table of Contents
Section 1.1: What is Cyber Warfare?
Section 1.2: Methods of Cyber Warfare Attacks
Section 1.3: Who is targeted by Cyber Warfare?
Section 1.4: How to defend against Cyber Warfare
Section 1.5: Cyber Warfare Companies and Agencies
Section 1.6: Cyber Counterintelligence
Section 1.7: Important situations pertaining to Cyber Warfare
Section 1.8: America versus China Cyber Warfare
Section 1.9: Cyber Warfare around the world
Section 1.10: Cyber Warfare everyday

What is Cyber Warfare? “Cyber warfare is a term used to describe the use of the Internet to wage war in the virtual world, often with real effects in the physical world,” (McGuigan). In the past recent years, cyber warfare has become a pertinent issue among the major nations on the planet; this issue has forced militaries, all over the world, to incorporate a new branch that is devoted to both conducting and protecting against cyber warfare. Cyber warfare is also used to define attacks amongst corporations, form radical organizations, and/or attacks by hackers, who are perceived as being warlike in their intent. Most situations pertaining to cyber warfare are attacks from one “sovereign state,” to another virtually in cyberspace (McGuigan). Cyber warfare is thought of by some as, “actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption,” (Clarke, 2010). Cyber warfare has also been called, “the fifth domain of warfare,”(Cyberwar: War in the Fifth Domain, 2012). Cyber warfare is a scary and unsettling situation for all nations around the world. The Pentagon even formally declared this type of warfare to be just as critical to our nation’s defense as any land, sea, air, or space operations.
Methods of Cyber Warfare Attacks Espionage and national security breaches, sabotage, and electric power grids are all methods of cyber warfare attacks. Cyber



Cited: Cyberwar: War in the Fifth Domain. (2012, July 01). Economist, pp. 15-21. Clarke, R. A. (2010). Cyber War. HarperCollins. McGuigan, B. (n.d.). What is Cyber Warfare? Retrieved Novemeber 15, 2012, from WiseGeek.com: http://www.wisegeek.com/what-is-cyber-warfare.htm

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Electric grids, power plants, hospitals, etc., rely largely on computers and the internet to store and access data. If the security to these facilities are breached, skewed data and power outages are a real possibility. Therefore, it could lead to serious economic problems, and possibly, even death. With all that said, cyberwarfare is not something to be taken lightly, in fact, the dangers are extremely significant. Additionally, since technology is so prominent, it is a convenient method of…

    • 445 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    This week I read “The Silent War”, which is an article written by James Bamford. This article is about the cyberwar that the US has been preparing for years. The articles states the resources available now to win the war, and what has been done so far to protect US interests. With the boom of the internet, the digitalization of the sensitive information, the increase of electronic communication, and the electronic monitoring of nuclear weapons, it becomes available to launch different types of cyberattacks. An example is given in the story about a cyberattack against the Iranian nuclear system with the collaboration of the Israeli. Also, the story gives a biography of the general Keith Alexander who led the National Security Agency (NSA) for…

    • 189 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Over the past couple of decades America has been fighting against the growing threat of terrorism. As the new millennium unravels, the age of the computer dawns the terrorists are beginning to fight on a different mainframe: the computer. The latest threat to U.S. intelligence is not terrorist attacks anymore, but cyber terrorism. As your Special Advisor on cyber security and cyber terrorism, I can prevent terrorist from all over the world from causing damage to our country.…

    • 613 Words
    • 3 Pages
    Best Essays
  • Best Essays

    Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Data Breach Essay

    • 665 Words
    • 3 Pages

    War is a part of the past and the present. In every war there are two sides, each hoping for land, power, or individual rights. When someone brings up the topic of war, images of guns and soldiers come to mind. But what if the war extended into cyberspace? No weapons or ruined battlegrounds, just virtual barriers and coding. It no longer becomes a two sided battle, but instead millions of individuals hidden behind computer screens. Anyone can participate in this, including terrorist groups, hackers, and phishers. And for this reason, everyone is at risk. People are getting away with their crimes because they keep information secret, working anonymously to perform illegal acts using the data stored in cyberspace. The United States government…

    • 665 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    References: Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Reznick, C. (2009). The Power of Your Child’s Imagination: How to Transform Stress and Anxiety Into Joy and Success. Los Angeles: McKinleyBrown |.…

    • 3606 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Adolescents and Cyberspace

    • 1419 Words
    • 6 Pages

    The Internet has a great deal of benefit in our lives. It is the window that opens onto the world and shows us everything that is happening around us. Although it is meant to help and support our needs, enrich our social lives and expand our civic connections, it has not been going so far in this way. A lot of research is showing that the heavy use of cyberspace is isolating people form the world around them. Knowing that adolescents are spending a great deal of their time in cyberspace, this article will examine the things they miss when they are left to grow up in it.…

    • 1419 Words
    • 6 Pages
    Better Essays