The affect cyber warfare has on the us.

Added on - 22 Sep 2019

  • 6


  • 1415


  • 103


  • 0


Showing pages 1 to 3 of 6 pages
The affect cyber warfare has on theusStudent Name:Course work:University:
In this present paper, we will discuss the effect of cyber warfare on the human beings. The cyberwarfare is defined as the internet based conflict which includes the politically motivated attackson the information system and intelligence. It is basically an action which is taken by the nation-state to penetrate the computers of other nation's computers. The purpose is to harm othernation's computers and cause them damages. It also includes actors of non-states for examplecompanies or groups of terrorist, criminal companies. It became the part of a military strategy bythe government, and it spends a huge amount on capabilities of cyber warfare. It is theformalized version of penetration testing. The government introduces it as the capabilities of warfighting. The government applied the penetration testing in a strategic manner which helps toprotect them from cyber-attacks, minimize the vulnerability of nation to cyber-attack and reducethe recovery time and damages from cyber-attacks. The official declared wars used offensiveoperations which are a fragment of national level strategies and it is also used for secretiveundeclared operations (Andress et al., 2013). There are two types of attacks, namely, cyber-attack and cyber-espionage. The cyber-attacks are mainly done to attack the computerinformation system. The cyber-attack can be known as cyber-terrorism, cyber-campaign andcyber warfare with the various contexts. The cyber-attacks can be done by an individual, groupof people or company which targets to attack networks of computers. The range of cyber-attacksis wide, and it can attack the entire nation through installing the spyware software on thecomputer or laptops.According to the author of ‘inside cyber warfare,' the cyber war can be waged by any countryregardless of the resourced used by them because the force of military is network concentric andit is situated with the internet which is insecure (Johansson et al., 2014). The cyber warfareattacks can be made by any in individual or group. The enabling of the internet potential to the
handgun is known as ‘the great equalizer.' Following are the four examples of cyber warfarewhich shows the condition in the country. Firstly, Serbia air defense system hacked the UnitedStates for compromising the air traffic control and introduced the bombing of Serbian targets inthe year 1998. Secondly, the botnet of more than millions of computers was brought down themedia websites, government, and organization across the Estonia. The attack was motivated bythe political tensions between the two countries, and it was started in Russia in 2007. Thirdly, themilitary agencies and high-tech hacked the foreign party in the United States, and terabytes ofinformation were saved by them in 2007 (Shakarianet al., 2013). The confidential information isaccessed by the ‘ghost Net’ and the information includes the information of private companiesand governmental of more than hundred countries across the globe. The ghost net was started inchina and later the responsibility is denied by them.The security information and networks provide effective protection to the cyber warfare attacks.All the system should get the application of security updates which comprises of informationwhich is not considered as critical because information can be co-opted by any vulnerable systemand further used to attack. The potential attacks can be mitigated through various measures suchas comprehensive disaster recovery planning which comprises of extended outages provisions.The United States is majorly dependent on the internet as it is the developed country, so thecountry exposed cyber warfare attacks greatly. It is having very important capabilities in powerprojection and defense. It is possible due to the large budget of military and advanced technology(Nicholson et al., 2012). The cyber warfare is the reflection of globalization which helps toexpand the technology of communication and integrate the markets. The cyber world isperforming outstanding year by year which facilitates the attacks of terrorists and hacking. Theconfidential files can be hacked by any individual through educating about the procedure of
You’re reading a preview

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document