Literature Review on Cyber Space and Cyber Warfare
Verified
Added on 2021/04/17
|4
|682
|63
AI Summary
The assignment provides a comprehensive literature review on cyber space and cyber warfare, discussing their evolution, threats, and impact on corporate and government sectors. It highlights the importance of understanding these concepts in today's digital society.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1 CYBER SPACE AND CYBER WARFARE Cyber space and Cyber warfare Name of the Student Name of the University Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 CYBER SPACE AND CYBER WARFARE Cyber space is a technology that is being used in order to connect many computing systems with each other and sharing information mutually. Cyber warfare is a source of virtual war that attacks the computing systems to receive the information of the oppositions and harm them using their detailed data. This report will portray the literature review of cyber space and cyber warfare. According toMazanec and Thayer (2015), Cyberspace is the platform that is needed to establish a link between more than on computer in order to share information among themselves. This technology enables the members of an organization to stay connected with each other and share the required information. With the increase in usage of the technology of cyber space, cyber warfare comes in disguise. Mitrou, et al (2016), stated that Cyber warfare is used for attacking virtually which is done by the virtue of the extensive usage of cyber space. The data is achievable through the cyber space platform and the data achieved is used against the owner of the information. The military and financial computer system infrastructures have been the main target of the cyber warfare, in order to gather the information about the military forces and the financial computing systems are targeted in order to receive information of the banking details and gain access to the secured documents of the organization. Again according to Clarke and Knake, (2014) Cyber warfare is used in order to block a networking site and steal the information from the networking site and piracy of the data is done in order to affect the brand image of the organization. The brand image of the organization suffers due to the conflictive conveyance of the information. Usage of cyber space
3 CYBER SPACE AND CYBER WARFARE According toBetz (2017), Cyberspace has been an ever evolving phenomenon that is gaining its importance because of the fact that data sharing through cyber space has no territorial limitations. The fact that cyber space allows distribution of the information among the mass makes this platform the most enhancing and used source of technology in today’s society. Literacy of mass is also a benefit that cyber space provides as the data that is present in the social media is available for the entire mass which can lead to distribution of knowledge through the cyber space platform. Threats of Cyber warfare Clarke and Knake (2014), stated that Cyber warfare has been targeting the corporate sector and the government sectors of the society. These two sectors has been the prime target of the cyber warfare attackers as the amount of money to be achieved is the most in these fields because the amount of income of the employed personnel is the most in these fields of the society. From the above discussion it can be concluded that cyber space and cyber warfare are inter related to each other though there is not any direct source of linkage between them. The growth in cyber space has been directly proportional to the growth of cyber warfare.
4 CYBER SPACE AND CYBER WARFARE Reference Betz, D.J., 2017.Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge. Clarke, R.A. and Knake, R.K., 2014.Cyber war. Tantor Media, Incorporated. Mazanec, B.M. and Thayer, B.A., 2015. Cyberspace and Cyber Warfare. InDeterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace(pp. 11-28). Palgrave Pivot, London. Pipyros, K., Mitrou, L., Gritzalis, D. and Apostolopoulos, T., 2016. Cyberoperations and international humanitarian law: A review of obstacles in applying international law rules in cyber warfare.Information & Computer Security,24(1), pp.38-52.