logo

Report on Advanced Security

   

Added on  2020-05-01

15 Pages4719 Words33 Views
ADVANCED SECURITY1ADVANCED SECURITYName of the StudentName of the UniversityAuthor Note

ADVANCED SECURITY2Table of ContentsIntroduction................................................................................................................................3History of Cyberwarfare............................................................................................................3Most threatening attacks in near past.........................................................................................3Cyber warfare laws....................................................................................................................4Cyber capability of countries.....................................................................................................5Sectors of attack.........................................................................................................................6Prevention..................................................................................................................................7Conclusion..................................................................................................................................8Referencing................................................................................................................................9

ADVANCED SECURITY3Introduction Cyber warfare can be considered to be network or computer based conflict whichmainly involve attacks which are politically motivated by a nation state on another nation.Taking into consideration the attacks the main focus point is to disrupt the activity which canbe related to organisation or states- nation with the intention of military purpose, strategic orcyberespionage. Although the main point which can be stated putting emphasis on the termis that the attack is mainly initiated with the purpose of disrupting a nation state whichinitiated by another nation state, it can also be used to describe attacks which are done byhacker groups or terrorist in order to furthering the goals which is related to a particularnation [7]. When the attacks are generated by advanced persistent threats (APT) actors itbecomes very much difficult to definitively attribute the cyber-attacks which are imposed onnation state, but this types of attacks are generally linked to a specific nation [8].The report mainly puts direct emphasis on the terms which are related to the cyberwarfare. There are many examples which can be stated in context to the topic which aremajor suspects of the attacks which are related to the cyber warfare taking into considerationrecent history. Taking into example a specific case study relating to the topic in order toobtain in-depth knowledge related to the topic is majorly done in this report.History of Cyberwarfare At the beginning of the year 2006 the US air force new mission was announced inwhich they pledged to “fight in space, air and cyberspace” [7]. The main recognition of themission was apparently related to some time: warfare will and can migrate into the concept ofthe cyberspace. The basic constitution of the cyber warfare mainly consists of operationwhich are related to the military by the concept of virtual means [1]. It consists of nationstates using cyberspace as a mean of attack to achieve a result which is same as compared to

ADVANCED SECURITY4initiating attacks with the military force. This is majorly done in order to achieve certain typeof advantage over a competing nation or the reverse of protecting themselves from the attackwhich is generated by another nation [9]. Like the concept of the terrorism, the warfare tends to result in property destructionwhich is sometimes in a massive scale and result in injury and deaths of the individual.Unlike the term terrorism it is supposed to be very much limited to the clashes between theaggregation of the individual (armies). Since the activity of the warfare is mainly conductedbetween nation state in order to maintain or restore the concept of external order within thenation. It can be stated that the main focus of the cyber warfare is not the injuring or the deathof the civilians and destroying the property of the civilians [5].Most threatening attacks in near pastThe threats which are related to the cyber-attacks have eventually become much morecomplex and sophisticated with the invention of the computer worm which tested the size ofthe internet by Sir Rober Morris [10]. It can be stated that the cyber warfare is currentlyhappening in the cyber space now. The discovery of the Stuxnet which is the first cyberweapon which was invented became a defining moment in the field of cyber warfare [6]. TheStuxnet was mainly invented for the purpose of the mechanical undercover work. But on theother hand the system did not take control, or the deletion part of the data instead the Stuxnetsmain objectives by then was to physically annihilate a target which was military based [10].A recent research stated that the Stuxnet had contaminated more than 60000 personalcomputers around the world but most in Iran. Taking into consideration the delimitativeexample was mainly to reprogram programmable logic controller (PLCs) to perform theattack which is intended them to do. In spite the factor that the main creator of the stunt wasnot properly recognized but the intend of the harm it can create could not be justified with the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Security
|13
|2712
|67

Contemporary issues in information technology Assignment 2022
|11
|3434
|56

Cyber Operations: Principles, Analysis, and Security
|15
|2960
|74

Cyber terrorism and Cyber warfare
|15
|4802
|116

Effect of Cyber Warfare on the US
|6
|1415
|478

Assignment on Cyberspace
|19
|4193
|368