logo

Cyberspace and Cyber Warfare - PDF

   

Added on  2021-04-17

4 Pages682 Words63 Views
1CYBER SPACE AND CYBER WARFARECyber space and Cyber warfareName of the StudentName of the UniversityAuthor note

2CYBER SPACE AND CYBER WARFARECyber space is a technology that is being used in order to connect many computingsystems with each other and sharing information mutually. Cyber warfare is a source of virtualwar that attacks the computing systems to receive the information of the oppositions and harmthem using their detailed data. This report will portray the literature review of cyber space andcyber warfare. According to Mazanec and Thayer (2015), Cyberspace is the platform that is needed toestablish a link between more than on computer in order to share information among themselves.This technology enables the members of an organization to stay connected with each other andshare the required information. With the increase in usage of the technology of cyber space,cyber warfare comes in disguise. Mitrou, et al (2016), stated that Cyber warfare is used forattacking virtually which is done by the virtue of the extensive usage of cyber space. The data isachievable through the cyber space platform and the data achieved is used against the owner ofthe information. The military and financial computer system infrastructures have been the maintarget of the cyber warfare, in order to gather the information about the military forces and thefinancial computing systems are targeted in order to receive information of the banking detailsand gain access to the secured documents of the organization. Again according to Clarke andKnake, (2014) Cyber warfare is used in order to block a networking site and steal theinformation from the networking site and piracy of the data is done in order to affect the brandimage of the organization. The brand image of the organization suffers due to the conflictiveconveyance of the information. Usage of cyber space

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Cyberspace
|19
|4193
|368

Cyber Operations: Principles, Analysis, and Security
|15
|2960
|74

Cyber Policies of the United States Assignment PDF
|8
|1831
|117

Research Report on Cyber Terrorism
|13
|2892
|200

The Business of Intelligence
|7
|1184
|365

Overview about Cyber Terrorism | Report
|12
|2450
|129