StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Warfare as an Alarming Issue across the Globe - Term Paper Example

Cite this document
Summary
This paper is about a Cyber warfare as an alarming issue across the globe. And there are various new software’s being developed to prevent any form of malicious attacks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Cyber Warfare as an Alarming Issue across the Globe
Read Text Preview

Extract of sample "Cyber Warfare as an Alarming Issue across the Globe"

ID: Network Security Paper Introduction This study would be centered towards cyber warfare. Cyber warfare is an alarming issue across the globe. There are various new software’s being developed to prevent any form of malicious attacks. Cyber warfare to certain extent has political intervention. Nation-state is observed to penetrate within network system of other countries with the motive of causing disruption or damage. This aspect does not only encompass nation-state but even real world organizations. The organizations mainly comprise of terrorist groups, ideological or political extremist groups, criminal organizations, hacktivists, etc. There are two kinds of cyber wars such as netwars where conflicts exist in internetted communication modes. The other form of cyber warfare is third generation warfare. This type of cyber warfare is based on information technology. Technological advancements have helped individuals to perform operations smoothly. On the contrary, technology is also a major threat for many firms due to evolution of malware. Network security is closely knitted with the concept of cyber warfare. Network administrator is responsible for designing policies or provisions that monitor or prevent any unauthorized modification, misuse or access. This study would encompass the case of. Stuxnet is a cyber-warfare weapon. It is considered to be a much complex malware. The weapon was not inclined towards industrial espionage such as manipulating, erasing or stealing information. It focused on completely disrupting any military target. Integrity and confidentiality is associated with information technology infrastructure. The study shall also include certain recommendations for prevent cyber warfare attacks like Stuxnet. Technical analysis of the paper topic, content, implications, and conclusions Cyber warfare weapon is also known as a piece of malware. The major objective of any malware is to disrupt confidentiality of a system. Information technology since many years has facilitated easier transmission of information from one system to another. Malware’s are basically developed to attack integrity of such system. In other words, it erases or manipulates valuable information. However there are some cyber warfare weapons whose impact cannot be lessened since it affects root level of a particular system. Stuxnet is one such cyber warfare weapon that totally destroyed SCADA systems. SCADA system is also regarded as a Windows application. This system enables human operators to exercise control over industrial process and properly analyze various set of process values. Stuxnet did not attack the software which is commonly observed in case of other malware. Industrial controllers have been targeted by the cyber warfare weapon and this was the reason behind its long-term impact. The entire paper content revolves around the procedure followed by Stuxnet to attack the system and related mitigation opportunities. Controllers and its function within a system have also been explained appropriately. Controllers can be stated as real time computer system that can manipulate any electrical output through program logic and electrical input signals. Controller program or ladder logic usually operates on physics rather than information. Controller manipulation tends to affect physical production process. Stuxnet targeted the main operation of controllers. Conventional warm technology is prevalent in many computer networks where malware being injected disrupts wide base of information. The variability of a cyber-warfare weapon increases when it has to target wide array of substances. This aspect was avoided in context of Stuxnet. Stuxnet was launched to adversely affect controllers manufactured by Siemens. Effectiveness of this weapon was dependent on code formulation. Programming software was used to find a match with controller’s program. Rogue code was loaded by Stuxnet’s dropper on the controller system. Controller infections have been witnessed in Iran and it has no such existence in other regions. Target region of Stuxnet was extremely narrow so that powerful impact can be caused. Stuxnet only targeted controllers and had no relation with information confidentiality. Three controller codes were encompassed within DLL driver, out of which one was 417 controller and other two were 315 controllers of Siemens. Controller target was firstly analyzed by the weapon in order to completely hijack the controllers (Langner 49). Logically structured format was followed for the rogue code. Command and control servers were not required by the weapon to attack machines. The entire operation of hijacking was exhibited through designing programming code. Process conditions are timers basically initiated attack. Attack codes were different in terms of 417 and 315. The code of 315 attack indicated that attack shall be halted in distinct strike condition. However the trend was not similar in context of another code. Legitimate controller in 417 attack code did not stop functioning at the time of running. The controller was just kept separate from I/O. Operation of this attack code was similar to that of not being able to access physical interface registers. Data was accessed by the code from buffer driver. A unique technological path was adopted during structuring of this cyber warfare weapon. Physical I/O was efficiently intercepted by the code. A fake process image was incorporated by this particular legitimate program code. On the other hand, fake driver utilized real time data. Microsoft later developed measures to prevent harmful impacts caused by Stuxnet. It was assumed that measures undertaken decreased the effect of cyber warfare weapon. Stuxnet’s dropper part was affected by security patch of Microsoft. To be more precise only certain section of the weapon was harmed but still it was productive enough. Digital warheads are still a matter of concern across the globe. Vulnerabilities which are caused by such weapon are not firmware or software defects. The function performed by Stuxnet is associated with legitimate product features. Siemens controller system was mainly affected by Stuxnet. It was recommended that asset owners should initiate technological change so as to ensure no harmful impact created by Stuxnet. New products being launched does not fully ensure that programming code cannot be designed to adversely destroy its functioning. Digital warheads when they are operating on controllers are less likely to be disarmed. In the current product generation, there is no such technology to dismantle Stuxnet. This weapon shall continue to harm controller system. Stuxnet is a source of inspiration for many malicious software developers. It mainly operates on the loophole present in the existing generation’s product range. Digital code signing is not available in the current controller systems. This form of digital signing shall guarantee that code is generated from a legitimate source. Stuxnet gained significance simply because there is lack of checking gateways when it comes to embedded controller systems. The paper concludes by stating that it is responsibility of manufacturers to design upgraded product versions. Controllers could also be monitored to analyze any change in its functioning. Individual driver with digital fingerprinting shall help in reducing adverse impacts of cyber warfare weapon. Change can then be detected easily and necessary steps should be undertaken. In real world scenario it becomes difficult to identify any change but digital technology based solutions would protect system from crashing or improper functioning. Microsoft developed security patches but main problem was with inferior technical elements. Reflection on the paper I feel this paper is able to well portray characteristics of cyber warfare weapon. It is a common perception that malware affects confidentiality or integrity of an information system. The concept of affecting controller system is an innovative approach. Cyber warfare weapons are usually observed to cause an impact on network systems or it targets information stored in a computer system. The chosen paper according to me clearly addresses effect of Stuxnet and its target area. A proper description is provided regarding which part is affected mostly by Stuxnet. It’s indeed a dissection paper where every small detail in context of target area and functioning of Stuxnet is highlighted. The weapon and its significant impact are also associated with an aviation advantage known as DEADFOOT. Hence I feel that the coverage of this paper is wide. It is not only confined to malicious attacks and its significant impacts but also includes certain unknown terms from different sector. Network security and cyber warfare is only linked with few aspects such as hijacking network or introducing a malware which manipulates or tries to erase information. IT people are focused on developing software which can counteract any malware, but this paper is able to prove that there are different ways to hijack a system. I could determine a separate version of digital warheads. Cyber warfare is a critical area where lot of research studies has been conducted. I have gone through some other research papers where inclination is only towards implications and probable remedies for an identified malware. The usage of controller system is a unique way to evaluate attack of malicious code. Process related elements are not observed in cyber warfare. This study has highlighted a new area of concern and preventive measures to be undertaken by manufacturers. In overall context, it is a well-structured paper incorporating technicalities and actions basically taken by organizations. The study on Stuxnet appeared as a threat for firm as well as opportunity to design effective mitigation techniques. Even security patches developed by Microsoft proved to be less productive in this paper. I have seen both loopholes being identified and strategies to solve loopholes outlined in this paper. Case in the defensive and offensive cyber warfare strategy Cyber warfare has become a progressive warfare after World War. This concept has enabled an individual to figure out which actors are most benefitted through this approach. Offensive cyber warfare strategy is beneficial for weaker components since it provides a strategic advantage. Power can be balanced efficiently with the support of such advantage. Offensive cyber warfare strategy is also considered to be a strategic balancing capability. This provides an advantage to weaker section to compete efficiently. It is more of challenging a hegemon versus another hegemon (Andress and Winterfeld 74). Cyber warfare has gained attractiveness due to information globalization and technological accessibility. Cyber infrastructure regulates the entire set of operation. Hence it becomes crucial to develop an efficient cyber warfare strategy. United States identified vulnerability against existing cyber-attacks. Globalization along with technological advancements resulted into proper distribution and exercise of power. China and Korea tried their best to be away from such cyber warfare. Their critical infrastructure was kept isolated so that it cannot be reached through Internet. The current century has tried their best to apply concepts in the field of cyber warfare. Offensive operational strategies are aligned with developing advantage through usage of information. Information advantage is mainly utilized in order to derail, complicate and obstruct process. This form of operation is related to interpreting or utilizing information, communication or accessibility of an adversary. Offensive cyber warfare strategy can be divided into two segments such as strategic cyber war and operational cyber war (Carr 66). Operational cyber war aims at enhancing military operations. Strategic cyber warfare strategy is focused on affecting behavior or security calculations of an adversary. Offensive cyber warfare strategy is associated with accessing information in order to safeguard system from malicious attacks. Cyber defense policy is somewhat different from that of offensive cyber warfare strategy. Cyber defense agenda was framed after 1999 cyber-attacks. Cyber defense policy was formulated by NATO in 2011. This policy was focused on securing networks and ensures minimum level of cyber defense. NATO’s governance then had formulated strategy to develop long term partnerships with industries. As per this policy cyber capabilities were reinforced and more emphasis was on training and development. Cyber defensive training program incorporated all form of co-operation from other industries. Political direction in development of defense strategy remains unclear. Own networks of NATO are taken into consideration by the defensive cyber warfare strategy (Rosenzweig 54). The program comprised of certain regions in favor of cyber defense policy such as Netherlands, Canada and Denmark. These capabilities are in the form of a multinational format. Smart Defense Initiative is basically framed by NATO members. It basically means sharing technical information, providing cyber-defense sensors, and efficiently sharing awareness of attacks or threats. Two-year defense policy was launched by NATO in order to protect system from any kind of cyber warfare. Cyber-attacks tend to disrupt functioning of a system. However offensive or defensive strategy is a way to mitigate negative implications of such cyber-attacks (Kizza 110). Cyber-attacks in United States are also considered to be a national security threat. Over the years there have been new software’s developed to ensure high productivity level of the system. Recommendation to prevent future cyber warfare attacks as Stuxnet Stuxnet was an innovative malware since it targeted a location which cannot be easily thought of by a manufacturer. Controllers were disrupted by Stuxnet through generating rogue codes. Cyber security is usually ensured by developing anti-virus software. This software helps to eliminate scope of malware negatively impacting a computer system. In the paper, it has been stated that Stuxnet can be disarmed only by gaining support of manufacturers. Manufacturers have to design such products which can efficiently handle such malicious software. On the other hand, product development would impose a major challenge on organizations preparing for cyber warfare. Controllers have to be monitored so that negative implications created on the system can be reduced to a minimum. Digital signature was also recommended in the paper since it could determine originality of a code. There are alternative paths which can be adopted to prevent any form of cyber warfare. Cyber security is ensured to a great extent through new software’s, encryption, firewall, employee training, strong passwords, etc. Research and development activities can be increased in this particular field of cyber security. This would provide information considering evolution of any malicious software. Future cyber warfare attacks can be prevented only when advanced technology is present in the market place. This technology is related to undertaking pre-emptive measures before any malware attacks a computer system. STEM education can prove to be highly beneficial in this context. Research and development is an essential component with the growth of innovative malware. Reformation is a needed to lessen impact of viruses in the system. Products are not so advanced and this is providing opportunity to firms or individuals to develop a malware which directly affects controller system rather than confidentiality of information. STEM education is closely knitted with reformation of mathematics, technology, science and engineering. This type of STEM education improves capability of cyber workforce in the system. Cyber workforce capabilities are developed within government and industry. Information sharing is enabled through such reformation of educational system. It is recommended that government should design a provision whereby a separate workforce shall be allocated for technological sector. This workforce would be dedicated towards preventing any form of cyber warfare in a region. STEM education is a mechanism through which expertise, skills or knowledge will be incorporated within the workforce. High-order activities would be performed by such key personnel such as protection of intellectual property of technical industry, and even safeguarding critical infrastructure. STEM education was centered towards some educational aspects but real time technical deficiencies would enlarge scope of this educational path. The probable impact would be in the form of increased base of IT professionals who shall hold security certifications. Cyber security expertise would also be highly prevalent in IT leaders and this shall prevent attacks of cyber warfare weapon like Stuxnet. Cyber skill sets would be present in such qualified personnel as they will be solely responsible for code writing, deep-packet inspection, techniques for big data analysis and defensive procedures. Works Cited Andress. Jason, and Steve, Winterfeld. Cyber warfare: techniques, tactics and tools for security practitioners. Waltham, MA: Elsevier. 2014. Print. Carr. Jeffrey., Inside cyber warfare: mapping the cyber underworld. New York: OReilly Media, Inc. 2011. Print. Kizza. Joseph., Computer network security. New York: Springer Science & Business Media. 2005. Print. Langner. Ralph., Stuxnet: dissecting a cyberwarfare weapon. IEEE, 11. 2011. Print. Rosenzweig. Paul., Cyber warfare: how conflicts in cyberspace are challenging America and changing the world. California: ABC-CLIO. 2013. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cyber Warfare as an Alarming Issue across the Globe Research Paper Example | Topics and Well Written Essays - 2500 words, n.d.)
Cyber Warfare as an Alarming Issue across the Globe Research Paper Example | Topics and Well Written Essays - 2500 words. https://studentshare.org/information-technology/1881112-network-security-paper
(Cyber Warfare As an Alarming Issue across the Globe Research Paper Example | Topics and Well Written Essays - 2500 Words)
Cyber Warfare As an Alarming Issue across the Globe Research Paper Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/1881112-network-security-paper.
“Cyber Warfare As an Alarming Issue across the Globe Research Paper Example | Topics and Well Written Essays - 2500 Words”. https://studentshare.org/information-technology/1881112-network-security-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Warfare as an Alarming Issue across the Globe

Risk in a New Era of Catastrophes

Name Professor Course Date Risk In A New Era Of Catastrophes 1.... .... States that are prone to adversities have devised diverse ways of ensuring the safety of their natives' prior occurrence of any potential natural tragedies.... This is because of the states' locations in relation to the occasionally occurring incidences resulting to immeasurable losses, which entail human besides property....
5 Pages (1250 words) Essay

Role of Globalization in Structuring Economy

25 Pages (6250 words) Research Paper

The Luddites and Their War on the Industrial Revolution

Runaway murders, increasing rates of suicides, horrible mass layoffs of employees who lived in security, the squalor of poverty visible everywhere, violence in the family, trumpet calls to civil war, lethal air and water, the soil that refuses to yield crops, the alarming pandemics, the animals and plants that are becoming extinct are the symptoms of the impending malaise....
8 Pages (2000 words) Essay

Law: Computer Misuse

The figures like this makes it clear that computer misuse is a very wide spread and board level issue that needs a more sound infrastructure to amply fight it, instead of relying on just the IT department of organizations to counteract it.... This alarming report is reason enough to undertake every measure to aid in provision of the security that the internet users deserve.... katerina Drozdova a doctoral candidate of Stern School of Business, New York University conducted a survey about legal codes regarding e-crimes in fifty countries and came up different actions that can account for breaching of cyber laws....
7 Pages (1750 words) Essay

A Non-Profit Organization the Edhi Foundation

It is called the Bilqis Edhi Trust and it was begun with just Rs.... 5000 and one room and one man running the entire show.... And is now the biggest organization in Pakistan that deals with… It was the beginning of its kind of societies and so it already had a competitive edge in the market place as the only one of its kind....
8 Pages (2000 words) Assignment

Cyber Attacks and Politics from a technological and security perspectives

Some of these threats include cyber terrorism, cyber espionage and cyber warfare (Czosseck & Geers, 2009).... Cyber security is a highly critical issue that nation's government should enact appropriate strategies of security to handle (Macaulay, 2009).... he reason why governments should be concerned with the issue of cyber security with regards to terrorism is because terrorists groups use the... cyber attack refers to an act of exploitation that is deliberately done by a person to either the computer systems or to the networks of those enterprises that solely depend on the technology use....
4 Pages (1000 words) Essay

Cyber Security

The paper seeks to answer questions related to cyber security such as: who is been harmed and by whom, what is the harm/causation, what is the broader implication of the harm and what is the major moral issue on hand.... With the situation so alarming, the President of USA, Barack Obama forced to declare the month of... US President Barack Obama in mentioned in a speech “Technology is reshaping every aspect of our lives, With the development of science and technology, the possibility of cyber threat increases....
10 Pages (2500 words) Term Paper

Ethical Issue in Information Technology

Annually, software worth million dollars are downloaded illegally, causing an immense setback to the software industry across the globe.... This paper, Ethical issue in Information Technology, stresses that the term information ethics refers to the discipline of applies ethics developed by Luciano Floridi....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us