Information Warfare & Cyberterrorism - Case Study Example

Comments (0) Cite this document
Summary
In cyberterrorism, most aggressors target the information content of the victim. However, in some cases the aggressor targets to paralyze the digital…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Information Warfare & Cyberterrorism
Read TextPreview

Extract of sample "Information Warfare & Cyberterrorism"

Download file to see previous pages According to Hollis (2008), international cyber terrorism has made digital form of storage of information become an insignificant advancement. In this paper, three major cyberterrorism cases that have occurred around the globe will be reviewed. In the three cases, the victims, the aggressors and the motives behind the attacks will be highlighted.
In this case the victim was Estonia. Major organizations in Estonia including the government were affected by this particular attack. Major websites in the government were disabled. Financial institutions in Estonia were also affected as their websites were jammed with foreign users (Traynor, 2007).
The aggressor in this case was Russia. However, Russia did not take responsibility for the attack, but the victims claimed the attacks were traced back to Russia. Analysts also argued the bitter political rivalry between Russia and Estonia was enough to link Russia to this particular attack. NATO investigated the issue and it was accused of double standards since they refused to directly accuse Russia of the attacks (Traynor, 2007).
Major websites in the government were hacked and they were accessible to many foreign people. Additionally, there was a viral attack which disabled many government websites which contained crucial information. To curb the cyber attacks, the government of Estonia and all the affected companies disabled all the affected websites. Additionally, the government disabled all foreign access to the country’s websites. It ensured that only domestic subscribers could view these websites.
The victim in this case was Georgia. The county was having political confrontations with Russia, which lasted for many years. After a truce agreement was signed to stop military war between the two nations, the war shifted to cyber attacks. The attacks were politically instigated as Russia was directly blamed for the attacks. Unlike ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Warfare & Cyberterrorism Case Study Example | Topics and Well Written Essays - 750 words”, n.d.)
Information Warfare & Cyberterrorism Case Study Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/miscellaneous/1607185-information-warfare-cyberterrorism
(Information Warfare & Cyberterrorism Case Study Example | Topics and Well Written Essays - 750 Words)
Information Warfare & Cyberterrorism Case Study Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1607185-information-warfare-cyberterrorism.
“Information Warfare & Cyberterrorism Case Study Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/miscellaneous/1607185-information-warfare-cyberterrorism.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Information Warfare & Cyberterrorism

Information warfare and cyber security

...? Table of Contents 2 1Introduction 3 1Background information on Information warfare 3 2Cyber Security  8 2Cyber terrorism 9 2.1What is cyber terrorism? 9 2.2How and why cyber-attacks take place 12 3Methods of information warfare 17 4Who are affected in information warfare /cyber terrorism?  20 5Risk Involved in information warfare 23 6Safeguards from Attacks 26 Military approach to cyber warfare safeguard strategy 27 Governmental and industrial approach to cyber defense 31 Cyber warfare technical and economic defense measures 33 Technical: 33 Economic 34...
40 Pages(10000 words)Research Paper

Warfare

...Information Center The Naval Postgraduate School. Rodin, D., 2006. Terrorism. In E. Craig, ed. Routledge Encyclopedia of Philosophy. London: Routledge. Sageman, M., 2004. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press. Scheider, B. & Davis, J., 2009. Avoiding the abyss: progress, shortfalls and the way ahaed in combatting the WMD threat. Greenwood: Greenwood Publishing Group. Schmid, A. & Jongman, A., 1988. Political Terrorism: A new guide to actors, authors, concepts, data bases, theories and literature. New York: Transaction Books. Shah, A., 2006. Media Manipulation. [Online] Available at: HYPERLINK "http://www.globalissues.org/article/532/media-manipulation"...
4 Pages(1000 words)Essay

Limited Warfare

...Limited warfare Limited warfare Limited warfare significantly differs from total warfare whereby one sacrifices everything he has in order to demolish the enemy. Conversely, limited warfare involves limitations to monarchies actions of warfare in regard to ways such as political, efficient, philosophical or collective reasons. The cold war was one to the instances whereby there was a case of limited warfare as the US pursued limited goals instead of unconditionally obliterating the enemy. The dangers of an immense power conflict and nuclear annihilation constantly gad a limiting effect on confined conflicts. In the...
3 Pages(750 words)Essay

Guerrilla warfare

...the state has the right to use aggression, force, and request for the aid from other countries (Michael). Keep in mind the literature, it can be analyzed from the above information that guerilla warfare although, is a form of war yet it breaks meaning and essence of the Just War theory. The military operations performed in the countries take the innocent lives as well. However, on the contrary it does abide by one of the rules of the just war theory which emphasizes upon protecting their own citizens against violation of rights. What still remains a question is that if guerilla wars are fought due to political reasons and protection of the citizens who takes the defensive mode and who attacks? It is...
5 Pages(1250 words)Essay

Unconventional Warfare

...INTRODUCTION Unconventional warfare is a covert and relatively undefined means of achieving military victory through a number of methods that reducesthe enemies' morale and disintegrates its ability to fight. The tactic used in unconventional warfare is mainly aimed at restricting civilian rights and freedom and instigating emotions like fear, depression and weariness. The various methods of unconventional warfare include guerilla warfare, sabotage and other activities including subversion and unconventional assisted recovery. One of the most common styles of unconventional combat is the guerilla warfare where small groups use tactics like ambushes and sudden raids on its larger enemy. Guerilla warfare was first referred as a war... of...
4 Pages(1000 words)Essay

Modern Warfare

... How have the wars of the twentieth, and now, twenty-first centuries shaped the lives of working people in the United s The Spanish Civil War lasted from 1936 to 1939. Others have viewed it as a conflict between the Spanish regions for supremacy. It has been described by various writers as a massive war and by others as an "uprising". Neither adjective is necessarily accurate, but what cannot be argued are the effects that the war had in the shaping of the working class. This essay asks me to discuss the effects of war on the shaping of the working class and my research has indicated that there was as Marx put it, a "mixed consciousness". This means that the working class had mixed reviews on war. There were those whom... How have the...
3 Pages(750 words)Essay

Cyberterrorism

.... Numerous cyber attacks have social or political motives behind them. The money gained through cyber crime (estimated to be about $100 billion) can be used to finance terrorism. Internet gives hackers and scammers anonymity with which they can access remote computers and personal information easily through identity theft. The advanced internet search technology provides attackers with a greater degree of information about hacking skills, far away from the eye of security officials. Moreover, the internet allows criminals to attack in an untraceable manner by enabling them to use computers owned by others to commit crimes. It must be noted that many a times, cyberterrorism is motivated...
8 Pages(2000 words)Essay

Warfare

...Importance of Warfare in Society pre-1500 CE Before 1500 CE, there were no mechanisms to resolve conflicts between two people groups. This inevitably led to wars between tribal groups. The reason for this was not so much just simply to vanquish the other group, but for one’s own survival as a race. This often meant taking over land and natural resources to sustain a group’s way of living. If a race of people did not have enough land to provide for their own tribe, it was then logical to attack the closest neighbor that could offer vast resources and land. Because there were no international bodies to mediate in conflicts between two groups, it was often the people who had the bigger army that won. Warfare...
1 Pages(250 words)Essay

Warfare

...; the tenet on legitimate authority was not passed given the fact that if Iraq was in contravention of UN sanctions, the United Nations would be the legitimating authority to sanction the war and not the US. Additionally, there is a lack of proof and presence controversies raised by reports that Iraq was planning an attack against the United States or US interests using weapons of mass destruction has raised (Wester, 2005). There are many changes that make traditional justifications for war to differ from the modern justifications as a result of changing nature of how wars are fought in the contemporary world. While traditional warfare targeted a specific nation, contemporary justification for war is based on the need to...
2 Pages(500 words)Case Study

Warfare

...Section/# Statistical Analysis of Afghanistan Civilian Deaths The utilisation of statistics is a poignant way in which data can be represented. An individual can oftentimes leverage a certain set of data to make a key point, whereas another individual can understand the same topic within a different framework entirely through the utilisation of alternate data. As such, the following discussion will be concentric upon an analysis of the article entitled ‘Tracking Civilian Deaths in Afghanistan’. Although the information therein represented is likely reflected without the intention to mislead or otherwise see the reader, the fact of the matter is that the data is incomplete and necessarily causes the reviewer/analyst to...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Information Warfare & Cyberterrorism for FREE!

Contact Us