StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Attacks on national security through the use of Internet and computers - Research Paper Example

Cite this document
Summary
“Cyber warfare or information warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means”(Billow & Chang, 2004, p.3). The development of computers and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Attacks on national security through the use of Internet and computers
Read Text Preview

Extract of sample "Attacks on national security through the use of Internet and computers"

Attacks on national security through the use of Internet and computers Attacks on national security through the use of Internet and computers “Cyber warfare or information warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means”(Billow & Chang, 2004, p.3). The development of computers and internet related technologies have opened a new channel of warfare for advanced countries.

It is believed that China has already started cyber warfare with its enemy countries such as America, India etc. One of the major features of cyber warfare is the ability to attack even distant targets and stay anonymous. America like countries are currently tightening security measures against information warfare. Information warfare (IW) is normally classified into two groups; IW without using physical force during peace time and IW with physical force during military wars. Now the important question is whether information warfare without physical force can be labelled as warfare or not.

This paper tries to answer this question. Whether information warfare without physical force can be labelled as warfare or notBefore answering the above question, it is interesting to know the details given below;Approximately two years ago, IW was used to disrupt the transfer of money from one arm of a Middle Eastern terrorist group to another. This terrorist financiers bank account was covertly broken into and the money was diverted. In a similar move at the beginning of the Kosovo conflict, methods were discussed and approved to put pressure on President Milosevic; these included tampering with or breaking into his bank accounts and disrupting his personal communications (Church, 2000).

From the above details, it is evident that IW can be used to cause immense economic damage to a country even during peace time. As mentioned earlier, it is difficult for the victim country to identify the source of attack and take preventive measures against cyber-attacks or IW. Computer networks are connected globally and it is easy for advanced countries to attack enemy targets without causing any human casualties. Trained computer professionals can break all the firewalls and cause immense financial damages in the enemy countries.

Even though there are plenty of international laws against military wars, these laws are inapplicable in the case of IW. In other words, the present cyber laws are incapable to handle anonymous attacks. Cyber warfare will involve disruption of crucial network services and data, damage to critical infrastructure, and the creation of uncertainty and doubt among opposing commanders and political leaders. Cyber-attack provides an ability to strike both tactical and strategic targets from a distance using inexpensive systems (Lewis, 2010, p.2). From the above statistics, it is evident that IW has the potential to cause big headaches to enemy countries.

When a country causes big damages in another country, it can be labelled as warfare even if it happens during peace time. ConclusionsIW is definitely a form of warfare irrespective of whether it happens during peace time or war time. IW has the potential to cause immense financial damages to a country. One of the major objectives of any warfare is to cause financial damages to enemy nation. In that respect, IW can definitely include in the category of warfare. References Billo, C. & Chang, W. (2004). Cyber warfare: An analysis of the means and motivations ofSelected nation states.

Retrieved from http://www.ists.dartmouth.edu/docs/cyberwarfare.pdfChurch, W. (2000). Information warfare. Retrieved from http://www.icrc.org/eng/resources/documents/misc/57jqcz.htmLewis, J.A. (2010). Thresholds for Cyberwar. Retrieved from http://csis.org/files/publication/101001_ieee_insert.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Attacks on national security through the use of Internet and computers Research Paper”, n.d.)
Attacks on national security through the use of Internet and computers Research Paper. Retrieved from https://studentshare.org/information-technology/1598979-attacks-on-national-security-through-the-use-of-internet-and-computers
(Attacks on National Security through the Use of Internet and Computers Research Paper)
Attacks on National Security through the Use of Internet and Computers Research Paper. https://studentshare.org/information-technology/1598979-attacks-on-national-security-through-the-use-of-internet-and-computers.
“Attacks on National Security through the Use of Internet and Computers Research Paper”, n.d. https://studentshare.org/information-technology/1598979-attacks-on-national-security-through-the-use-of-internet-and-computers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Attacks on national security through the use of Internet and computers

Network Issues That Led to Shamoon Incident at Aramco

Otherwise, the ease to access, lack of proper authorization, and use of ancient anti-hacking and firewall software, jeopardizes the security of Aramco's network system.... Indeed, Shamoon affected many companies but its success in Aramco rates at 75% of the company's computers (Norman ASA, 2012, p.... The network system in Aramco offers security to theft of data but has no capacity to handle annihilation manifested by Shamoon.... Sadly, the network system of Aramco allows multiple users to access both unclassified and classified information at the same time, which jeopardizes the security of the system as seen in the Shamoon attack....
4 Pages (1000 words) Case Study

Denial of Service Attacks (DoSs)

Cross-site Scripting (XSS) In this kind of attack a web application works as a source of help for launching an attack to an end user's browser by making use of the web browser of other web users who visit the page.... That's why DoS attack gains popularity on the internet (Chan et al.... One of the most well-known web server security attacks is known as a buffer overflow.... hellip; Denial of Service Attacks (DoSs) One of the most well-known web server security attacks is known as a buffer overflow....
7 Pages (1750 words) Essay

Excessive Filtering of the Internet in Schools

hellip; People access the e-books or scanned books through the library network and they can simply share what they access with others for example through laptops and PDA's.... Mainly, the devices that use wireless technology are the devices that can be carried easily from one place to another such as Laptop computers, Personal Digital Assistants (PDA's), and Cell Phones.... "Many laptop computers have wireless cards pre-installed for the buyer....
9 Pages (2250 words) Essay

Information Technology

he growth in the use of internet has however presented enormous challenges.... The anti-virus software is capable of even blocking the computers from spy wares that have also become a rampant form of internet insecurity.... It is clear that the battle against cyber crime and all other forms of internet insecurity is being won.... Such measures can include invention of effective Internet monitoring tools, increased use of security analysis tools as well as an increased use of hard-to-crack passwords and firewalls (Flynn, 2001)....
8 Pages (2000 words) Essay

Conducting Cyber Intelligence and Restricting Cyber Attacks on Organizations

rom this paper it is clear that the world has seen a number of attacks on its dignity and self-respect.... nbsp;Cyber intelligence is a method through which security threats are tracked, countered and analyzed in a number of different ways.... nbsp; This study highlights that cyber intelligence is a method through which security threats are tracked, countered and analyzed in a number of different ways.... The business organizations have now understood that these cyber attacks would bring down their business so they have devised ways and means through which these attacks could be kept away and work could be done at full speed....
12 Pages (3000 words) Essay

Why and How Cyber Attacks Occur

Today, with the ubiquity of the use of the Internet in every political and social sector cyber attacks are increasingly growing in numbers.... The major reason behind this is that the concept of internet governance is subjected to various political and economic difficulties along with a lack of opportunities for assessing different regulatory policies (Shackelford, 2014, p.... Cyber attacks are an illegal process of infiltration into computers to extract or destroy data and information....
5 Pages (1250 words) Case Study

The Problem of Cyber Attacks

Keith Alexander, CEO of national security Agency said: "I'd like to say that our networks are secure, but that would not be correct.... n the book written by Richard Clark and Robert Knake called the Cyber War: The Next Threat to national security and What to do about it, they explain how a major cyber attack on the United States could cripple the economy and leave thousands of people dead.... “Struggling to keep pace with the growing number of attacks on its computer networks, potentially leaving infrastructure in America vulnerable to overseas hackers” (Gorman, 2009)....
5 Pages (1250 words) Case Study

Hacking in the US

A hacker first attacks on some easy sources to hide the traces and then launches his/her attack on secure sites.... he Internet is a network of networks that join many private and government computers together.... The internet also has its disadvantages.... This paper, Hacking in the US, stresses that the advancement in the technology and its widespread use has caused certain serious problems to many countries of the world, especially to technically advanced countries such as the United States....
14 Pages (3500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us