E-Warfare

1980 Words4 Pages

Question The 21st century has seen warfare adopt many new faces, among those the use of the Internet as a weapon. Explore an e-warfare incident and discuss its success or failure. In your answer detail how you as a network manager could protect your organisation against e-warfare. Abstract In the following essay I will define ‘E-warfare’ and outline types of attacks which are associated with it. I will identify an incident which has taken place and discuss whether the incident was successful or failed. I will then attempt to give a detailed explanation of how if I was an appointed network manager, that I would protect an organization against e-warfare. I use examples when necessary to provide a realistic appreciation of the use of attributes that support my recommendations When one thinks of warfare, the traditional meaning of armed conflict comes to mind. Dictionary.com (2008) defines warfare as armed conflict between two massed enemies, armies, or the like. But as technology develops the face of war has changed, it can now be accomplished electronically, which is known as electronic warfare or ‘E-warfare’. E-warfare is the use of computers and the internet to conduct warfare in cyberspace. There are various types of attacks which can be conducted electronically, which include hacking, denial-of-service or distributed denial-of-service and web vandalism. Recently an event occurred in which an electronic attack took place which had a devastating impact on the country of Estonia, taking down government and other organizations websites. The attack which took place was a distributed denial-of-service (DDoS) attack. With these attacks occurring, prevention methods need to be put in place in order to reduce the impact. As so... ... middle of paper ... ... ‘Gadi Evron Interview’, 2007, SearchSecurity.com, 26 July, accessed 30/3/08, http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci1265720,00.html Huegen, C 2000, The Latest in Denial of Service Attacks: “Smurfing” Description and Information to Minimize Effects, weblog, 8 Feb, accessed 1/4/2008, http://www.pentics.net/denial-of-service/white-papers/smurf.cgi Myres, S 2007, “Cyberattack on Estonia stirs fear of 'virtual war'”, Herald Tribune, 18 May, accessed 28/4/2008, http://www.iht.com/articles/2007/05/18/news/estonia.php “The Cyber Raiders Hitting Estonia”, BBC News, 17 May, accessed 28/3/2008, http://news.bbc.co.uk/2/hi/europe/6665195.stm The Economist 2007, accessed 01/04/2008, http://www.economist.com/world/international/displaystory.cfm?story_id=E1_JNNRSVS Quinn, M 2006, Ethics for the Information Age, Pearson Education, USA

Open Document