We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Attacks on national security through the use of Internet and computers - Research Paper Example

Comments (0)
“Cyber warfare or information warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means”(Billow & Chang, 2004, p.3). The development of computers and…
Download full paper
Attacks on national security through the use of Internet and computers
Read TextPreview

Extract of sample
Attacks on national security through the use of Internet and computers

Download file to see previous pages... America like countries are currently tightening security measures against information warfare. Information warfare (IW) is normally classified into two groups; IW without using physical force during peace time and IW with physical force during military wars. Now the important question is whether information warfare without physical force can be labelled as warfare or not. This paper tries to answer this question.
Approximately two years ago, IW was used to disrupt the transfer of money from one arm of a Middle Eastern terrorist group to another. This terrorist financiers bank account was covertly broken into and the money was diverted. In a similar move at the beginning of the Kosovo conflict, methods were discussed and approved to put pressure on President Milosevic; these included tampering with or breaking into his bank accounts and disrupting his personal communications (Church, 2000).
From the above details, it is evident that IW can be used to cause immense economic damage to a country even during peace time. As mentioned earlier, it is difficult for the victim country to identify the source of attack and take preventive measures against cyber-attacks or IW. Computer networks are connected globally and it is easy for advanced countries to attack enemy targets without causing any human casualties. Trained computer professionals can break all the firewalls and cause immense financial damages in the enemy countries.
Even though there are plenty of international laws against military wars, these laws are inapplicable in the case of IW. In other words, the present cyber laws are incapable to handle anonymous attacks.
Cyber warfare will involve disruption of crucial network services and data, damage to critical infrastructure, and the creation of uncertainty and doubt among opposing commanders and political leaders. Cyber-attack provides an ability to strike both tactical and strategic targets from a distance using inexpensive ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Research report on Internet Security
Through internet, people can access the bank accounts, e-mails and other information. Essentially, internet acts as a limitless source of information. However, with all good aspects which are offered by internet, it also opens the door for possibly dangerous threats.
12 Pages(3000 words)Research Paper
Network Security
New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies.
13 Pages(3250 words)Research Paper
Information warfare and cyber security
  20 5Risk Involved in information warfare 23 6Safeguards from Attacks 26 Military approach to cyber warfare safeguard strategy 27 Governmental and industrial approach to cyber defense 31 Cyber warfare technical and economic defense measures 33 Technical: 33 Economic 34 7Disaster Recovery Planning  34 8Future of Information warfare and cyber security  36 9Conclusion 38 Bibliography 41   Abstract In the last few decades there has been a revolutionary change in the field of warfare, where computer has turned out be a major player.
40 Pages(10000 words)Research Paper
Cyber Attacks and Security
One example of this nuisance is the use of cyber-attacks, which refers to the intentional compromise of a computer system through the Internet or the intentional tracking of a user on the net (Lewis, 2011). This means that cyber-attack has two broad definitions, the first definition being the unauthorized gathering of information about a user.
4 Pages(1000 words)Research Paper
Security Risks on the Web: Problems and Solutions
With rapid global development came the electronic revolution. Like other technologies, the Internet is now a necessity and without it businesses would cease their operations. There is an increase in the number of security risks on the Internet called cybercrimes all over the world.
7 Pages(1750 words)Research Paper
Internet crimes
Individual People 7 A. Dealing with Internet Crimes 7 B. Personal Computers as Target of Internet Crimes 8 V. Conclusion 9 References 10 Internet Crimes I. INTRODUCTION Nowadays you will not be shocked if one of your friends told you that he was cybercrime victim by stealing his credit card number or his identity information.
6 Pages(1500 words)Research Paper
Security Framework
This has led to the development of such security frameworks as the ISO 27000 Series which has become an important factor to be considered if individuals as well as organizations and institutions are to be able to protect themselves from malicious people and software from the internet.
5 Pages(1250 words)Research Paper
Internet Banking - Computers and Internet
Thereafter research paradigms are stated. This is followed by an explanation of the methods used in the collection of the data. This paper, then explains the process of drawing the sample of respondents from out of the target population and the chapter finally winds up with presenting arguments in favours of and against the chosen methods of collection of the data, primarily, in terms of seeking to establish its reliability and validity.
43 Pages(10750 words)Essay
Network Security
According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information. Consequently, internet security has become one of the most researched aspects of information technology.
10 Pages(2500 words)Research Paper
U.S. Department of Homeland Security's Role in Combatting Cybersecurity
Currently, the cyber war has been increased due to increased level of disturbances emerge in the computer networks and rising complexities that are prevalent within the
9 Pages(2250 words)Research Paper
Let us find you another Research Paper on topic Attacks on national security through the use of Internet and computers for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us