This paper discusses the effect of cyber warfare on the US, including types of attacks, defense strategies, and vulnerabilities. The US is vulnerable to cyber warfare due to its dependence on the internet and advanced technology. The military strategy of the US is framed by five pillars for cyber warfare. The paper also discusses the factors contributing to cyber-attacks and the process of intrusion kill chain for information security.
| 6 pages
| 1415 words
| 478 views
Trusted by 2+ million users, 1000+ happy students everyday
The affect cyber warfare has on theusStudent Name:Course work:University:
In this present paper, we will discuss the effect of cyber warfare on the human beings. The cyber warfare is defined as the internet based conflict which includes the politically motivated attacks on the information system and intelligence. It is basically an action which is taken by the nation-state to penetrate the computers of other nation's computers. The purpose is to harm other nation's computers and cause them damages. It also includes actors of non-states for example companies or groups of terrorist, criminal companies. It became the part of a military strategy by the government, and it spends a huge amount on capabilities of cyber warfare. It is the formalized version of penetration testing. The government introduces it as the capabilities of warfighting. The government applied the penetration testing in a strategic manner which helps to protect them from cyber-attacks, minimize the vulnerability of nation to cyber-attack and reduce the recovery time and damages from cyber-attacks. The official declared wars used offensive operations which are a fragment of national level strategies and it is also used for secretive undeclared operations (Andress et al., 2013). There are two types of attacks, namely, cyber-attack and cyber-espionage. The cyber-attacks are mainly done to attack the computer information system. The cyber-attack can be known as cyber-terrorism, cyber-campaign and cyber warfare with the various contexts. The cyber-attacks can be done by an individual, group of people or company which targets to attack networks of computers. The range of cyber-attacks is wide, and it can attack the entire nation through installing the spyware software on the computer or laptops.According to the author of ‘inside cyber warfare,' the cyber war can be waged by any country regardless of the resourced used by them because the force of military is network concentric and it is situated with the internet which is insecure (Johansson et al., 2014). The cyber warfare attacks can be made by any in individual or group. The enabling of the internet potential to the
handgun is known as ‘the great equalizer.' Following are the four examples of cyber warfare which shows the condition in the country. Firstly, Serbia air defense system hacked the United States for compromising the air traffic control and introduced the bombing of Serbian targets in the year 1998. Secondly, the botnet of more than millions of computers was brought down the media websites, government, and organization across the Estonia. The attack was motivated by the political tensions between the two countries, and it was started in Russia in 2007. Thirdly, themilitary agencies and high-tech hacked the foreign party in the United States, and terabytes of information were saved by them in 2007 (Shakarianet al., 2013). The confidential information isaccessed by the ‘ghost Net’ and the information includes the information of private companies and governmental of more than hundred countries across the globe. The ghost net was started in china and later the responsibility is denied by them. The security information and networks provide effective protection to the cyber warfare attacks. All the system should get the application of security updates which comprises of information which is not considered as critical because information can be co-opted by any vulnerable systemand further used to attack. The potential attacks can be mitigated through various measures such as comprehensive disaster recovery planning which comprises of extended outages provisions. The United States is majorly dependent on the internet as it is the developed country, so the country exposed cyber warfare attacks greatly. It is having very important capabilities in power projection and defense. It is possible due to the large budget of military and advanced technology(Nicholson et al., 2012). The cyber warfare is the reflection of globalization which helps to expand the technology of communication and integrate the markets. The cyber world is performing outstanding year by year which facilitates the attacks of terrorists and hacking. The confidential files can be hacked by any individual through educating about the procedure of
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss