We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Information warfare and cyber security - Research Paper Example

Comments (1)
Summary
Table of Contents Abstract 2 1Introduction 3 1.1Background information on Information warfare 3 1.2Cyber Security  8 2Cyber terrorism 9 2.1What is cyber terrorism? 9 2.2How and why cyber-attacks take place 12 3Methods of information warfare 17 4Who are affected in information warfare /cyber terrorism?…
Download full paper
GRAB THE BEST PAPER
Information warfare and cyber security
Read TextPreview

Extract of sample
Information warfare and cyber security

Download file to see previous pages... Referred to as the information warfare, it poses a high security risk to any country’s critical infrastructural base, and is thus of great concern to the various governments as they are forced to create new measures to protect the national assets. Information warfare in the 21st century has become more diverse in nature, with various changes in its design taking place owing to innovativeness in technology and greater informational access. This diverse nature has also expanded the scope for application of information warfare mechanisms into critical non-military arenas, like the commercial environment. The introduction of information through the use of internet and computers within the military arena has given rise to various force multipliers like Network Centric Warfare, Information Operations, and the C4I2SR Systems, and this age of information warfare and cyber terrorism often referred to as Revolution in Military Affairs (RMA), has not only changed the way modern wars are fought, but have also opened a new perspective in the domination of a new arena, the cyber space. This paper will take an in-depth look into the sphere of information warfare. Information warfare and cyber security 1 Introduction “One hundred victories in one hundred battles is not the most skillful. Seizing the enemy without fighting is the most skillful.” Sun Tzu (Sixth Century B.C). 1.1 Background information on Information warfare The various technological innovations and scientific discoveries that have occurred in the last two or three decades have been in the general benefit of mankind, yet these same scientific advancements have been put to negative use by some, for causing wide scale damages to the society at large. This threat has taken a more distinct form since the arrival of Internet during the 1990s, where not all internet users have used the virtual realms for beneficial or peaceful activities. Information warfare is one such instance where certain criminals have put computers (internet) and the information obtained through it, for various nefarious activities. Information warfare is a form of terrorism used effectively to weaken entities, and is an emerging threat for all nations’ worldwide and global commerce, with the potential to effectively breakdown the critical infrastructural framework of any country, and is an example of what Sun Tzu had predicted in the 6th century BC, about “seizing the enemy without fighting.” In the recent times both instances of attack and degree of threat have reached such large proportions that cyber war is now considered at par with land, air, or sea wars, with a persistently increasing potentiality to cause grave damages to the security of any nation, as were evinced in the attacks on Georgia and Estonia (Beidleman, 2009). This is particularly dangerous in many of the developed nations where the critical infrastructure and processes like commercial activities and utilities, banking sector, and mode of communications completely operate through the computers and the cyberspace. Even more than a decade after the Internet came into being, there are no universally recognized uniform codes of laws or an authorized body to govern the cyberspace, ...Download file to see next pagesRead More
Comments (1)
Click to create a comment
he
heberhettinger added comment 2 months ago
Student rated this paper as
I had an issue with a research paper types of works. All until I came across this website and this particular paper. Even though "Information warfare and cyber security" is far from my studies, the structure is so great that I use it all the time as an example for my own works.
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Cyber Terrorism
The dependence on IT networks is a defining feature of most industries in today’s world. The corporate sector, the banking and financial sector, the marketing sector and even the entertainment industry are all globally integrated via the internet. The global internet, in recent times forms the backbone of business and knowledge sourcing, sales and marketing, banking and finance, strategy management and many more systems.
10 Pages(2500 words)Research Paper
Scope and Kinds of Cyber Security

The conclusion states thatthe common saying of “a stitch in time saves nice” aptly applies to the field of cybersecurity. This can be done so in multiple ways, the first being creating a sense of awareness, second about safe practices, third technical knowledge and increasing research in this field and finally making long-term policies that are designed towards safer operations of computers.

22 Pages(5500 words)Research Paper
Cyber Crime as opposed to Cyber warfare
The world has become a global village after rapid developments and advancements in information and communication technology, media resources, transportation, and networking. The interaction and coordination among people has improved tremendously in last 3 decades after the advent of internet and use of desktop PCs and laptop notebooks.

 

11 Pages(2750 words)Research Paper
Cyber Security Information Technology Research Paper
Data and valuable information is being stored in the servers and this makes them susceptible to hacking. People and organizations thus take strict measures in safeguarding their information. In spite of these measures, hackers and crackers still have their ways of accessing private information without authority from the legitimate owners.
5 Pages(1250 words)Research Paper
Cyber threat analysis
Cyber crimes have had very serious implications on the economic and data security of various organizations and world in general. In attempts to reduce cyber mayhem, the following paper will discuss the concepts of cyber threat analysis and technologies involved in accomplishing the task.
6 Pages(1500 words)Research Paper
Cyber Security and Information Security
If the article notes that this relative risk is changing and to what does the article attribute the change? Phneah (2013) reports on how organizational risk coming from inside sources is currently evolving and insiders that pose a risk are working in different and more complex ways.
4 Pages(1000 words)Assignment
Cyber Crimes
According to studies, cyber crimes have the potential of harming a nation’s security system and its financial well-being if these criminal levels escalate. In many cases, these cyber crimes include copyright infringement, underage pornography, government cracking, and child grooming.
10 Pages(2500 words)Research Paper
Attacks on national security through the use of Internet and computers
It is believed that China has already started cyber warfare with its enemy countries such as America, India etc. One of the major features of cyber warfare is the ability to attack even
2 Pages(500 words)Research Paper
Cyber Terrorisum Past Present and Future
The political and social agenda is the main objective of cyber terrorists. Cyber terrorism aims at coercing or intimidating the government, its population and their properties. Although many authors have
10 Pages(2500 words)Research Paper
International security
This concept is regarded as information warfare and is often stated as analogous in comparison to conventional warfare. Cyber threats are basically asymmetric in nature and its attacks can perpetuate in many
15 Pages(3750 words)Research Paper
Let us find you another Research Paper on topic Information warfare and cyber security for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us