Information warfare and cyber security - Research Paper Example

Comments (1) Cite this document
Summary
Table of Contents Abstract 2 1Introduction 3 1.1Background information on Information warfare 3 1.2Cyber Security  8 2Cyber terrorism 9 2.1What is cyber terrorism? 9 2.2How and why cyber-attacks take place 12 3Methods of information warfare 17 4Who are affected in information warfare /cyber terrorism?…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Information warfare and cyber security
Read TextPreview

Extract of sample
"Information warfare and cyber security"

Download file to see previous pages Referred to as the information warfare, it poses a high security risk to any country’s critical infrastructural base, and is thus of great concern to the various governments as they are forced to create new measures to protect the national assets. Information warfare in the 21st century has become more diverse in nature, with various changes in its design taking place owing to innovativeness in technology and greater informational access. This diverse nature has also expanded the scope for application of information warfare mechanisms into critical non-military arenas, like the commercial environment. The introduction of information through the use of internet and computers within the military arena has given rise to various force multipliers like Network Centric Warfare, Information Operations, and the C4I2SR Systems, and this age of information warfare and cyber terrorism often referred to as Revolution in Military Affairs (RMA), has not only changed the way modern wars are fought, but have also opened a new perspective in the domination of a new arena, the cyber space. This paper will take an in-depth look into the sphere of information warfare. Information warfare and cyber security 1 Introduction “One hundred victories in one hundred battles is not the most skillful. Seizing the enemy without fighting is the most skillful.” Sun Tzu (Sixth Century B.C). 1.1 Background information on Information warfare The various technological innovations and scientific discoveries that have occurred in the last two or three decades have been in the general benefit of mankind, yet these same scientific advancements have been put to negative use by some, for causing wide scale damages to the society at large. This threat has taken a more distinct form since the arrival of Internet during the 1990s, where not all internet users have used the virtual realms for beneficial or peaceful activities. Information warfare is one such instance where certain criminals have put computers (internet) and the information obtained through it, for various nefarious activities. Information warfare is a form of terrorism used effectively to weaken entities, and is an emerging threat for all nations’ worldwide and global commerce, with the potential to effectively breakdown the critical infrastructural framework of any country, and is an example of what Sun Tzu had predicted in the 6th century BC, about “seizing the enemy without fighting.” In the recent times both instances of attack and degree of threat have reached such large proportions that cyber war is now considered at par with land, air, or sea wars, with a persistently increasing potentiality to cause grave damages to the security of any nation, as were evinced in the attacks on Georgia and Estonia (Beidleman, 2009). This is particularly dangerous in many of the developed nations where the critical infrastructure and processes like commercial activities and utilities, banking sector, and mode of communications completely operate through the computers and the cyberspace. Even more than a decade after the Internet came into being, there are no universally recognized uniform codes of laws or an authorized body to govern the cyberspace, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information warfare and cyber security Research Paper”, n.d.)
Retrieved from https://studentshare.org/visual-arts-film-studies/1425226-information-warfare-and-cyber-security
(Information Warfare and Cyber Security Research Paper)
https://studentshare.org/visual-arts-film-studies/1425226-information-warfare-and-cyber-security.
“Information Warfare and Cyber Security Research Paper”, n.d. https://studentshare.org/visual-arts-film-studies/1425226-information-warfare-and-cyber-security.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
he
heberhettinger added comment 7 months ago
Student rated this paper as
I had an issue with a research paper types of works. All until I came across this website and this particular paper. Even though "Information warfare and cyber security" is far from my studies, the structure is so great that I use it all the time as an example for my own works.
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Cyber Security
...? Cyber security 02-02 Cyber security According to www.thefreedictionary.com, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by internet,...
10 Pages(2500 words)Coursework
Cyber Warfare in China
...notes from the first Gulf War and the way in which America achieved easy victory over Iraq, attracted the Chinese leadership very much. In fact China started preparations for cyber warfare immediately after the first gulf war. In 1990’s, China established thee different agencies such as Ministry of State Security (MSS), Ministry of Public Security (MPS) and the Ministry of Information to conduct cyber warfare on others. Chinese cyber army is kept in the private sector in order to put dust in the eyes of others. In 1995 then–Major General Wang Pufeng, former Director of the Strategy Department of the...
20 Pages(5000 words)Term Paper
Cyber Crime as opposed to Cyber warfare
..., place and time. The use of intranet, extranets, internet and information systems across organisations have contributed significantly in growth and prosperity because it facilitates timely communication with business parties. However, the emergence of hackers and criminals that develop viruses and malwares have jeopardised the security of public and private business information and records in an organisation. The author, therefore, has decided to conduct extensive research over growing menace of cyber crimes and cyber warfare because the present 21st century is known as ‘information era’. Nonetheless, the organisations...
10 Pages(2500 words)Essay
Cyber Crime as opposed to Cyber warfare
...and time.  The use of intranet, extranets, internet and information systems across organisations have contributed significantly in growth and prosperity because it facilitates timely communication with business parties. However, the emergence of hackers and criminals that develop viruses and malwares have jeopardised the security of public and private business information and records in an organisation. The author, therefore, has decided to conduct extensive research over growing menace of cyber crimes and cyber warfare because the present 21st century is known as ‘information era’. Nonetheless, the...
11 Pages(2750 words)Research Paper
Cyber Security and Information Security
...?Textbook: Management of Information Security by Whitman and Mattord Chapter 2 P. 70 Using a web search engine, find an article from a reputable source published within the past six months that reports on the relative risk that comes from inside the organization as opposed to risk that comes from external sources. If the article notes that this relative risk is changing and to what does the article attribute the change? Phneah (2013) reports on how organizational risk coming from inside sources is currently evolving and insiders that pose a risk are working in different and more complex ways. For example, Phneah (2013) suggests that previously, risks from inside the company were previously more about...
4 Pages(1000 words)Assignment
Cyber security
...CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when...
2 Pages(500 words)Coursework
Cyber security
...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework
Cyber Security
...is a generic term covering the multiplicity of crimes found in penal codes or in legislation having the use of computers as a center component (Girasa, 2002). Cybercrime can be analyzed in a narrow and broad sense. Narrowly, it can be defined as an illegal activity related to computer and computer aided services. Broadly, it refers to an illegal work, which can be committed by means relating to computers or any kind of network system. The concept of cyber security in modern world can be discussed in light of increasing cyber threat. Cyber security can be defined as a system which is used by the government and various organizations to protect...
10 Pages(2500 words)Term Paper
Cyber Security
...Cyber Security Stuxnet is a computer virus designed specifically to aid hackers attack industrial plants without the knowledge or identification of the operators. It is the first attack that grants the hackers the opportunity of manipulating world equipment and as a result of this, it is very dangerous. Stuxnet is a product of the U.S and Israel project (Bacrach, 2013). Its impact is well known; it destroyed approximately 20% of Iran’s nuclear centrifuges through making them spin uncontrollably. It also infected a Russian nuclear power plant very badly. In tandem to this, the paper aims at providing detailed information on how Stuxnet was introduced to Iran’s and Russian power plants, how...
3 Pages(750 words)Essay
Cyber Security
...Cyber Security al Affiliation Cyber Security Cyber security is emerging global challenge that has seen some s such as North Korea and China implicated in cyber-attacks. Cyber-attack is possible because of cyberspace, a situation where all computers globally are connected to the Internet. Cyberspace comprises of computers, mobile phones and computer network. A state cyberspace, for example, is a global cyberspace because Cyberspace has no borders. Computer networks make a nation cyberspace a global cyberspace. An individual in one side of the world can access information on the other side...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Research Paper on topic Information warfare and cyber security for FREE!
Contact Us