Preview

The Pros And Cons Of Cyber Warfare

Good Essays
Open Document
Open Document
519 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Pros And Cons Of Cyber Warfare
“People ask me all the time, 'What keeps you up at night?' And I say, 'Spicy Mexican food, weapons of mass destruction, and cyber-attacks.” - Dutch Ruppersberger. In other words cyber-attacks and war fare has the potential to have the save destruction as WMDs. We need to pay attention towards cyber warfare because it is the way of the future. Fight has gone from bow and arrows to drone airplanes and now cyberspace. Cyber warfare is simple and inexpensive; all a terrorist needs is a computer and a connection. That is why terrorists are leaning towards cyber-attacks. Cyber terrorism has a huge impact on many lives across the globe. In order to end cyber warfare countries must find why they are being attacked and how they are being attacked. The primary reason for cyber warfare is the lack of sophisticated army encrypted security on public and …show more content…
This lack of security doesn’t only affect the business but also the innocent people that entrusted the business with their private information. This cannot be entirely blamed on enterprises alone but on the internet as a whole it so easy to access nearly from anywhere all you need is a computer and a connection and it is hard to trace down good hackers.
Cyber terrorism is terrorist activities intended to damage or disrupt vital computer systems (Merriam-Webster). Cyber Terrorism is a form of fear and is very similar to physical terrorism, except terrorist use computers to wreak havoc on innocent people. An example of cyber terrorism would be putting a virus on business computers which allows them to hack into their databases stealing or changing information. They could also steal money from the business. Terrorist groups also use cyber warfare for modern communications like planning, recruiting, propaganda purposes, enhancing communications, command and control, fund raising and funds transfer, and information gathering. The

You May Also Find These Documents Helpful

  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High | |Unauthorized Data Access |High |High |Low | |The small business and companies should address and take care of the security holes and threats, and it should not be necessarily a complicated and costly process. The small business and companies need to have information security, for the following reasons:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Malicious damage occurs with most businesses, and they haven’t been easy to deal with either. There are at least 2 types of malicious that occur more often, they are worms and viruses, they both play a huge role when it comes to damaging a business…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Better Essays

    In recent discussions of the use of unmanned drone strikes in the war on terror, a controversial issue has arisen in relations to the collateral damage involved in such attacks. Despite the popular beliefs of many people around the world they sky is not full of unmanned killing machines. These machines are piloted from a safe distance from the battles or target areas. They are flown by experienced Air Force pilots who have trained for years with these machines. Although this does not mean others are not killed in missile strikes that target terrorist organization leaders. What this means is they are trained to minimize what is known as collateral damage. Collateral…

    • 1137 Words
    • 5 Pages
    Better Essays
  • Good Essays

    To begin with, small businesses are becoming a main focus by hackers. One main reason is small business do not believe it can happen to them because of all the big business that are out there serving a similar customer. When small businesses go electronic the main focus is not cyber security. One reason why is due to the income level of the business. Most small businesses are even taking a financial leap of faith, when going electronic connecting there business to the internet. Often times small businesses are gambling on if they have enough customers to go beyond a credit card machine let alone internet visibility, due to cost of website maintenance and website security, while keeping a store location up and running.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Loss of Customers- Weak system security can also result in the loss of customers as people will not want to use a business that has problems with their security as their personal details or information may be at risk. For example, if a bank has a weakness in its security, and this weakness is exploited by hackers; then customers’ information may be stolen and used to purchase goods under their name. This…

    • 744 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    “We are now faced with a combination of new and traditional actors, a widened set of motivations and tactics, organizational structures and principles, as well as a wider range of threats along the technological spectrum, especially with the increased potential for the terrorists use of weapons of mass destruction. Counter terrorism must deal with a wider range of threats…

    • 2278 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    There is an exigent need for creative ideas leading to the next generation of cyber security capability. Existing approaches are simply not able to meet the demands of a global society growing in cyberspace on the current path. New business models are forcing greater interdependency between people, organisations and nation states in order to successfully manage cyber risk. Success will necessarily require an ability to anticipate, deter, detect, resist and tolerate attacks, understand and predict cyber risks, and respond and recover effectively at all levels, whether individual, enterprise, national or across international markets. In order to meet the demands of the future we will require new understanding, governance, regulation, partnerships, skills, and tools.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Accountability Formation

    • 531 Words
    • 3 Pages

    The dictionary states that the meaning of the word accountability is “the state of being accountable, liable, or answerable”. This means to me that if I don’t hold accountability for all my gear than I am not doing my duty as a soldier. Holding accountability for my gear is important for many different reasons in fact. For one if anything were to happen to my gear I am held sole responsible for it. Also if it is stolen or ruined for my lack of accountability and due to my actions the company is held back from doing their duties or even I completing mine, I would also be the one held accountable for the hold back. If the gear was stolen I would need to pay for it and it wouldn’t be anyone else’s fault except my own, even if it were simply damaged I would need to replace and/or fix as swiftly as possible to complete my duties so that I am not the one holding back others. Specially with it coming so close to leaving on a mission it is crucial that I hold exceptional accountability for my gear for I would not want to be the sole reason for a glitch in the mission before even leaving, with everyone working so hard to get ready to leave and to have everything in working condition in order for the mission to hopefully go off without a hitch. Being accountable for my gear is to be dependable. Being dependable in keeping track of all my gear so that I am ready for anything that would be needed of me at any time, rather it’s from my country, my superiors, or my fellow soldiers. It is also crucial for me to hold accountability for my gear being a specialist I am setting an example for other soldiers below me and for me not to hold that accountability it doesn’t make me look like a very good role model to look upon in time of need, for any reason. Showing accountability is also a duty for me as a soldier to keep track of all of my gear. If my equipment was taken they could of tampered with the gear and then given it back with me not…

    • 531 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    American Government

    • 328 Words
    • 2 Pages

    Contention 2) Cyber attacks are dilemmas that can be prohibited. Subpoint A: There are many ways for the United States to be attacked by terrorists other than the bombings itself, they are called Cyber Attacks. Cyber Attacks are an attempt by hackers to damage or destroy a computer network or system. These are attacks that can affect us deeply because Americans today are becoming more and more dependent on the internet. Though the government of America has much of it’s private information recorded on paper, yes but much is saved on the Internet as backup. With this, terrorist groups hire hackers or even study about computers to be able to launch a Cyber Attack that would help them steal and even look through the information to give them an advantage. With them knowing the key aspects of the government that would help them to bring even more danger upon not only the government but also the Citizens and other individuals that live here in our country. With cyber attacks it would lead to Cyber Warfare. Cyber warfare can be like any other war, just because it isn’t being fought face to face or weapons being involved it is of high danger either way. With this,the enemies can find ways to hurt us as a country, cause damage that would take years to recovers just like 9/11.Which would cause wars amongst the nations/countries. As Martin C. Libicki from the RAND corporation states “ Because much of what goes on in cyberspace is invisible, what one state perceives as normal operating procedure, another could perceive as just about anything.” With this he means even if one self may think what they put on the internet even with high security, others can use it for anything even if the person may think it’s harmful. The U.S. has been receiving cyber attacks from china which has leaded us to enormous losses to U.S. jobs states Senator Brown…

    • 328 Words
    • 2 Pages
    Satisfactory Essays