StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information warfare and cyber security - Research Paper Example

Cite this document
Summary
Table of Contents Abstract 2 1Introduction 3 1.1Background information on Information warfare 3 1.2Cyber Security  8 2Cyber terrorism 9 2.1What is cyber terrorism? 9 2.2How and why cyber-attacks take place 12 3Methods of information warfare 17 4Who are affected in information warfare /cyber terrorism?…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Information warfare and cyber security
Read Text Preview

Extract of sample "Information warfare and cyber security"

Download file to see previous pages

Referred to as the information warfare, it poses a high security risk to any country’s critical infrastructural base, and is thus of great concern to the various governments as they are forced to create new measures to protect the national assets. Information warfare in the 21st century has become more diverse in nature, with various changes in its design taking place owing to innovativeness in technology and greater informational access. This diverse nature has also expanded the scope for application of information warfare mechanisms into critical non-military arenas, like the commercial environment.

The introduction of information through the use of internet and computers within the military arena has given rise to various force multipliers like Network Centric Warfare, Information Operations, and the C4I2SR Systems, and this age of information warfare and cyber terrorism often referred to as Revolution in Military Affairs (RMA), has not only changed the way modern wars are fought, but have also opened a new perspective in the domination of a new arena, the cyber space. This paper will take an in-depth look into the sphere of information warfare.

Information warfare and cyber security 1 Introduction “One hundred victories in one hundred battles is not the most skillful. Seizing the enemy without fighting is the most skillful.” Sun Tzu (Sixth Century B.C). 1.1 Background information on Information warfare The various technological innovations and scientific discoveries that have occurred in the last two or three decades have been in the general benefit of mankind, yet these same scientific advancements have been put to negative use by some, for causing wide scale damages to the society at large.

This threat has taken a more distinct form since the arrival of Internet during the 1990s, where not all internet users have used the virtual realms for beneficial or peaceful activities. Information warfare is one such instance where certain criminals have put computers (internet) and the information obtained through it, for various nefarious activities. Information warfare is a form of terrorism used effectively to weaken entities, and is an emerging threat for all nations’ worldwide and global commerce, with the potential to effectively breakdown the critical infrastructural framework of any country, and is an example of what Sun Tzu had predicted in the 6th century BC, about “seizing the enemy without fighting.

” In the recent times both instances of attack and degree of threat have reached such large proportions that cyber war is now considered at par with land, air, or sea wars, with a persistently increasing potentiality to cause grave damages to the security of any nation, as were evinced in the attacks on Georgia and Estonia (Beidleman, 2009). This is particularly dangerous in many of the developed nations where the critical infrastructure and processes like commercial activities and utilities, banking sector, and mode of communications completely operate through the computers and the cyberspace.

Even more than a decade after the Internet came into being, there are no universally recognized uniform codes of laws or an authorized body to govern the cyberspace,

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information warfare and cyber security Research Paper”, n.d.)
Retrieved from https://studentshare.org/visual-arts-film-studies/1425226-information-warfare-and-cyber-security
(Information Warfare and Cyber Security Research Paper)
https://studentshare.org/visual-arts-film-studies/1425226-information-warfare-and-cyber-security.
“Information Warfare and Cyber Security Research Paper”, n.d. https://studentshare.org/visual-arts-film-studies/1425226-information-warfare-and-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information warfare and cyber security

Cyber Attacks and Politics from a technological and security perspectives

The government of all nations should put in place effective cyber security measures.... cyber security deals with the protection of information and information systems against the significant threats that global computer networks face.... cyber security is a highly critical issue that nation's government should enact appropriate strategies of security to handle (Macaulay, 2009).... For instance, the federal government of the United State embarked on allotting more than $ 13 billion each year from the year 2010 to cater for the cyber security....
4 Pages (1000 words) Essay

Avoiding Cyber Threats in E-Commerce

The paper "Avoiding Cyber Threats in E-Commerce" provides a deep insight into measures available to prevent cyber-attacks - intrusion detection prevention systems, firewalls, encryption, anti-virus software, and login passwords, and programs for enhancing consumers' awareness of security.... hellip; The global security technology and services were estimated to be $67.... The cybersecurity standards are prevailing security standards that enable various organizations to practice safe security techniques so as to reduce the number of successful cybersecurity attacks (Amoroso, 2012)....
6 Pages (1500 words) Essay

Cyber Terrorism and Warfare

Law, policy, and technology: Cyberterrorism, information warfare, and Internet immobilization.... This will ensure that national security agencies are able to respond immediately.... Cyber terrorism and warfare, according to national defence leaders, poses a great risk to the national security of the U.... This will ensure that national security agencies are able to respond immediately when new vulnerabilities are identified (Schiller, 2010)....
1 Pages (250 words) Research Paper

Cyber Terrorism and Information Warfare

  This paper “Cyber Terrorism and information warfare” is an evaluation of the various types of internet crimes, how they are accomplished and where possible, the proper measures that can be taken to prevent the crime in order to make the use of internet safer.... hellip; The author states that the advancement in technology has had both positive and negative impact on society and in the business fields....
10 Pages (2500 words) Dissertation

Ethical Issue in Information Technology

This paper, Ethical Issue in information Technology, stresses that the term information ethics refers to the discipline of applies ethics developed by Luciano Floridi.... In his theory of information ethics, he asserted that information ethics should be included under the umbrella of computer ethics.... nbsp;… As the paper outlines, the present “information society” is facing the escalating dilemmas about the life of information....
6 Pages (1500 words) Term Paper

Stuxnet: Dissecting a Cyberwarfare Weapon

To counter this attack, Microsoft developed a program that would be used in security patching.... Due to this, it was classified as the first-ever cyber-weapon.... Unlike other computer viruses that erase or steal any information, Stuxnet's main aim was destroying a military target (Ralph, 49).... Unlike other computer viruses that erase or steal any information, Stuxnet's main aim was destroying a military target (Ralph, 49)....
6 Pages (1500 words) Assignment

Cyber Warfare as an Alarming Issue across the Globe

Network security is closely knitted with the concept of cyber warfare.... This paper is about a cyber warfare as an alarming issue across the globe.... There are two kinds of cyber wars such as netwars where conflicts exist in internetted communication modes.... The other form of cyber warfare is third generation warfare.... This type of cyber warfare is based on information technology.... Stuxnet is a cyber-warfare weapon....
10 Pages (2500 words) Term Paper

Security of Information in Government Organisations

security of information in Government OrganizationsIntroductionThe maintenance of assets and operations for the accomplishment of the goals and objectives in organizations has progressively become more and more a reliant on information systems and security of information in Government OrganizationsIntroductionThe maintenance of assets and operations for the accomplishment of the goals and objectives in organizations has progressively become more and more a reliant on information systems and technology....
15 Pages (3750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us