15 October 2015
Cyber Warfare: the New Frontier
Since the beginning of time, mankind has waged war against each other. Over the years warfare has evolved, from fighting with sticks and stones to using gunpowder and launching missiles. The newest, and possibly most destructive, type of warfare is cyber warfare. Cyber warfare has the possibility to be more devastating than nuclear warfare.
The world is in another cold war, except this time countries are battling for cyber supremacy. Cyberspace is a massive land of ever changing technology and personal interaction (McGuffin and Mitchell 1). Cyberspace is not only a place that people post pictures and update their profile, but it also plays an enormous role in running a country. Advanced countries use computers to guide their military, keep track of citizens, run their power grids, and hold plans for nuclear devices and nuclear power. Risks to commercial and government concerns are now being noticed and many countries are taking actions to prevent such threats (McGuffin and Mitchell 1). Many countries have already embraced the power of cyber space. “In Japan, a new strategy has been put forward that includes the use of cyber space in defense policy and military doctrine” (Olender 1). The strange thing about cyber warfare is that the larger and more advanced countries are the countries that are most at risk. Those countries such as the United States have become so dependent on technology that if they were attacked, they would have the most to lose. The larger countries such as Great Britain, Russia. United States, and Canada have entire power grids that are controlled through computers. So if another country were to hack into the server and shut dow...
... middle of paper ...
...type of warfare is cyber warfare. Cyber warfare has the possibility to be more destructive than nuclear war.
Crowther, G. Alexander, and Shaheen Ghori. "Detangling the web: a screenshot of U.S. government cyber activity." Joint Force Quarterly July 2015: 75+. War and Terrorism Collection. Web. 28 Oct. 2015.
"Edward Snowden Biography." Bio.com. A&E Networks Television, n.d. Web. 06 Nov. 2015.
McGuffin, Chris, and Paul Mitchell. “On domains: cyber and the practice of warfare.” International Journal 69.3 (2014): 394+. Academic OneFile. Web. 5 Oct. 2015.
Olender, Michael. “Keeping Pace with Cyber Power, Defense, and Warfare.” Journal of International and Global Studies 6.2 (2015): 55+. Academic OneFile. Web. 5 Oct. 2015.
Thomas, Teka. "Cyber defense: Who 's in charge?" National Defense July 2015: 21+. War and Terrorism Collection. Web. 28 Oct. 2015.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Society has become ever-increasingly dependent upon technology, more specifically, computers to conduct personal and business transactions and communications. Consequently, criminals have targeted these systems to conduct information and cyber warfare, which can include politically motivated attacks and to profit through ill-gotten means. In an article written by Koblentz and Mazanec (2013), cyber warfare is the act of disabling an enemy’s ability to use or obtain information, degrade its ability to make decisions, and to command its military forces.... [tags: Cyber, warfare, E-commerce]
1833 words (5.2 pages)
- Introduction Cyber warfare is a new type of terrorism is the United States. The United States National Security Team is responsible for handling computer warfare battles against hackers. The government should invest more money and resources in cyber warfare defense to protect our nation’s economy and infrastructure that is heavily dependent on technology. Imminent Threat The threat of a cyber-attack on our nation’s infrastructure is now viewed by the majority of American’s as an imminent and credible one that demands greater resources and spending.... [tags: hackers, threat, cyber-attack]
811 words (2.3 pages)
- According to Technopedia, a Cyber warrior is somebody who engages in cyber warfare. This could be for personal reasons or out of religious or patriotic beliefs. (Hub Pages, 2015) Cyber-warriors, depending on their roles, come in different forms. They all deal with information security in one way or another. Cyber warriors battle in the front line of computer security either by attacking or defending other systems. In modern days, cyber warriors can use social media sites such as Facebook, Instagram, and Twitter as cyber weapons.... [tags: Social media, Social network service, Web 2.0]
840 words (2.4 pages)
- ... Many said the tanks weren’t ready for battle, and that they should keep them a secret from the Germans until they were running at full capacity. These hesitations became a reality. The tanks failed during the attack. They struggled on the terrain of the Somme, many of the crew members were inexperienced and unfamiliar with their controls, and several had mechanical failures as well. By the end of the week, British and French forces had made a considerable advancement, at most 2,300 miles in some areas, but had failed to break through the German lines.... [tags: warfare weapons]
1174 words (3.4 pages)
- For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous and space-less digital environment. Both state and non-state actors have already embraced this new realm and utilized both legal and illegal means to further facilitate their interests.... [tags: Information Technology ]
2204 words (6.3 pages)
- In the modern world of technology, many of us still consider being hacked a rare issue we will not have to encounter in our lifetime. The unfortunate truth is that everyone who uses a computer or cell phone is at a high risk of being hacked. In a post by Information Security, they reveal, “Three out of four Americans will be a victim of cyber-crime” (Goldberg 1). Cybercrime is defined as a crime conducted via the internet or some other computer network. The frightening high statistics of being a victim of cybercrime makes me ask the question, what can we do to protect ourselves more efficiently against cyber intuitions.... [tags: Internet, Computer security, Security]
715 words (2 pages)
- Shortly after the horrendous violations of human rights by the Nazi’s, in 1949 the Geneva Convention was created. This fourth treaty was established to create the rules and regulations of what is expectable in times of warfare. It gives protection to civilians in times when war tares families and countries apart. President Obama speaking on the importance of the fourth Geneva Convention stated, “We lose ourselves when we compromise the very ideals that we fight to defend…And we honor those ideals by upholding them not when it's easy, but when it is hard” (“President”).... [tags: International Conflict ]
2500 words (7.1 pages)
- Cyber Warfare Introduction Many nations in the world - the United States, China, Russia, Iran, Germany, and more- use cyber warfare as a method of conducting sabotage and espionage. Nations, such as China and Russia, use espionage in order to prevent their economy and their military technology from falling behind by stealing advanced nations’ technology. Other nations, including Israel and Iran, focus on sabotaging other nations to cripple them, by sending malwares that destroy important data on the system, from advancing their technology and costing them a decent amount of money due to repairs.... [tags: Sabotage, Espionage, Technology]
1748 words (5 pages)
- The images are haunting: soldiers in gas masks rapid firing through dusky vapours, people contorted with a pain that comes from within. Chemical warfare has long been acknowledged as a devastating tactical weapon, but the origin of this impression is now being debated. While it is a common held belief that chemical warfare is a form of modern warfare and that the First World War is recognised for introducing this type of combat, recent archaeological finds show this may prove otherwise. According to accepted definitions of chemical warfare, newly discovered battle tactics used by humanity’s ancestors may not be so different from those of modern warfare.... [tags: Warfare]
1330 words (3.8 pages)
- "It is now clear that cyber threat is one of the most serious economic and national security challenges we face as a nation," President Obama has said in one of his addresses to the nation. He would go on the say that "We know that cyber intruders have probed our electrical grid, and that in other countries cyber attacks have plunged entire cities into darkness." (Net Security.org, 2009) When the president of the United States puts this much emphasis into a subject it shows how important it is and how big of an impact it could have on the nation.... [tags: cyber attacks, 2015]
1013 words (2.9 pages)