“Cyber warfare or information warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means”(Billow & Chang, 2004, p.3). The development of computers and…
America like countries are currently tightening security measures against information warfare. Information warfare (IW) is normally classified into two groups; IW without using physical force during peace time and IW with physical force during military wars. Now the important question is whether information warfare without physical force can be labelled as warfare or not. This paper tries to answer this question.
Approximately two years ago, IW was used to disrupt the transfer of money from one arm of a Middle Eastern terrorist group to another. This terrorist financiers bank account was covertly broken into and the money was diverted. In a similar move at the beginning of the Kosovo conflict, methods were discussed and approved to put pressure on President Milosevic; these included tampering with or breaking into his bank accounts and disrupting his personal communications (Church, 2000).
From the above details, it is evident that IW can be used to cause immense economic damage to a country even during peace time. As mentioned earlier, it is difficult for the victim country to identify the source of attack and take preventive measures against cyber-attacks or IW. Computer networks are connected globally and it is easy for advanced countries to attack enemy targets without causing any human casualties. Trained computer professionals can break all the firewalls and cause immense financial damages in the enemy countries.
Even though there are plenty of international laws against military wars, these laws are inapplicable in the case of IW. In other words, the present cyber laws are incapable to handle anonymous attacks.
Cyber warfare will involve disruption of crucial network services and data, damage to critical infrastructure, and the creation of uncertainty and doubt among opposing commanders and political leaders. Cyber-attack provides an ability to strike both tactical and strategic targets from a distance using inexpensive ...
Cite this document
(“Attacks on national security through the use of Internet and computers Research Paper”, n.d.)
Retrieved from https://studentshare.net/information-technology/521215-attacks-on-national-security-through-the-use-of-internet-and-computers
(Attacks on National Security through the Use of Internet and Computers Research Paper)
“Attacks on National Security through the Use of Internet and Computers Research Paper”, n.d. https://studentshare.net/information-technology/521215-attacks-on-national-security-through-the-use-of-internet-and-computers.
Through internet, people can access the bank accounts, e-mails and other information. Essentially, internet acts as a limitless source of information. However, with all good aspects which are offered by internet, it also opens the door for possibly dangerous threats.
New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies.
20 5Risk Involved in information warfare 23 6Safeguards from Attacks 26 Military approach to cyber warfare safeguard strategy 27 Governmental and industrial approach to cyber defense 31 Cyber warfare technical and economic defense measures 33 Technical: 33 Economic 34 7Disaster Recovery Planning 34 8Future of Information warfare and cyber security 36 9Conclusion 38 Bibliography 41 Abstract In the last few decades there has been a revolutionary change in the field of warfare, where computer has turned out be a major player.
One example of this nuisance is the use of cyber-attacks, which refers to the intentional compromise of a computer system through the Internet or the intentional tracking of a user on the net (Lewis, 2011). This means that cyber-attack has two broad definitions, the first definition being the unauthorized gathering of information about a user.
With rapid global development came the electronic revolution. Like other technologies, the Internet is now a necessity and without it businesses would cease their operations. There is an increase in the number of security risks on the Internet called cybercrimes all over the world.
Individual People 7 A. Dealing with Internet Crimes 7 B. Personal Computers as Target of Internet Crimes 8 V. Conclusion 9 References 10 Internet Crimes I. INTRODUCTION Nowadays you will not be shocked if one of your friends told you that he was cybercrime victim by stealing his credit card number or his identity information.
This has led to the development of such security frameworks as the ISO 27000 Series which has become an important factor to be considered if individuals as well as organizations and institutions are to be able to protect themselves from malicious people and software from the internet.
Thereafter research paradigms are stated. This is followed by an explanation of the methods used in the collection of the data. This paper, then explains the process of drawing the sample of respondents from out of the target population and the chapter finally winds up with presenting arguments in favours of and against the chosen methods of collection of the data, primarily, in terms of seeking to establish its reliability and validity.
According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information. Consequently, internet security has become one of the most researched aspects of information technology.