logo

Cyber Warfare: Overview, Technologies, Challenges, and Future Research Directions

   

Added on  2023-06-05

11 Pages2621 Words331 Views
Running head: CYBER WARFARE
Cyber Warfare
Name of the Student
Name of the University
Author Note
Cyber Warfare: Overview, Technologies, Challenges, and Future Research Directions_1
1CYBER WARFARE
Table of Contents
Introduction......................................................................................................................................2
Overview of the topic..................................................................................................................2
Relevant technologies and applications of the technologies.......................................................3
Highlighting the challenges/problems.........................................................................................5
Identification of any gaps in the literature by:.............................................................................6
• Discussing areas/issues that have been addressed.................................................................6
• Highlighting areas/issues that have not been addressed........................................................6
Summary of the future research directions based on the identified research gaps......................6
Critical evaluation of recent research with a minimum of 7 research articles.............................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Cyber Warfare: Overview, Technologies, Challenges, and Future Research Directions_2
2CYBER WARFARE
Introduction
Cyber Warfare is as perilous as any other warfare in the history of mankind. Just like any
other normal warfare, cyber warfare is a constant struggle of the cyber world to keep the
malicious cyber attackers at bay (Langner, 2014). Cyber world has opened up new ways for this
malevolent attackers to make use of strategic threats, making them a powerful entity. However,
media coverage has made cyber warfare unknown facts about the common mass which is
enhance the awareness about the malicious attackers and their attacking abilities. This is made
people to take up strategic ideas while getting online to prevent them from this malevolent
attackers.
An overview of the entire topic will be presented as a literature review including relevant
Technologies and application for the Technologies and highlighting the challenges and problems
faced in cyber warfare (Robinson, Jones & Janicke, 2015). It would further identify any gaps in
the literature was reviewed by discussing the areas that have been addressed in the current
literature highlighting the areas that have not been addressed adequately and discussing the view
on the issue. A summary of the future is a direction will be further presented based on the
identified research gaps with the critical evaluation of recent researches.
Overview of the topic
The topic of cyber warfare is not similar than a normal military warfare. This can be said
because in a military Warfare a country takes shield against an attack that attempts to damage the
nation and its resources. In the similar manner a cyber warfare is the actions taken by any
international organization or a country to prevent the attack and attempts made by any
malevolent entity who probably would want to diamonds the computers an extract confidential
Cyber Warfare: Overview, Technologies, Challenges, and Future Research Directions_3
3CYBER WARFARE
information through the network with the use of either computer viruses or denial of service
attacks (Green, 2015).
In this context warfare means either online control systems computers or a series of
networks in a nation or an international organization. Although, there are many controversial
opinions about whether these operations by any malicious attacker can we considered as a word
but the way different nations like China, Russia, United Kingdom, Israel and the United States
have been developing defensive natures to fight the cyber criminals for preventing espionage and
sabotage it can be surely seen that the preparations are nothing less of preparing for war (Ween
et al., 2016).
The more advancements Technology has been making, there are reports of exponentially
increasing vulnerabilities that are making them susceptible to any kind of Cyber-attacks and
cyber threats. This has become a major problem since mostly the data and information remain at
stake (Jajodia et al., 2015). The information can either be about an individual or about an
international organization or the government itself. Confidential and intricate data cannot be
compromised as such. This is because it has an ability to crumble down an entire organization or
even an entire nation. This, countries and organizations are making themselves prepare with
various strategies to fight the further attacks stop the country from falling apart.
Relevant technologies and applications of the technologies
A number of definitions have been proposed to understand the cyber warfare but is often
seen that no single definition has been adopted internationally in a wide range. This definitions
are able to make a person understand about the different Technologies and methodologies
applied to prevent the cyber-attacks and also define the types of threats. Thus, following would
Cyber Warfare: Overview, Technologies, Challenges, and Future Research Directions_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Assignment | Cyber Warfare
|10
|2836
|30

Importance of Cyber Security in Retail Industry
|21
|7572
|72

Wireless Network Security and Preventive Techniques
|12
|3476
|20

Data Breaches and Identity Theft
|4
|701
|18

Wireless Network Technology and Preventive Techniques
|12
|2757
|322

Computer Systems & Security
|1
|446
|24