Cyber Warfare
Introduction
Many nations in the world - the United States, China, Russia, Iran, Germany, and more- use cyber warfare as a method of conducting sabotage and espionage. Nations, such as China and Russia, use espionage in order to prevent their economy and their military technology from falling behind by stealing advanced nations’ technology. Other nations, including Israel and Iran, focus on sabotaging other nations to cripple them, by sending malwares that destroy important data on the system, from advancing their technology and costing them a decent amount of money due to repairs. Another popular cyber attack used, mainly with hacktivist, government- sympathetic groups not owned by the government, and nations less advanced in technology, is Denial-of-service, or DoS. DoS is used to hinder the target’s website and other things that are maintained by computers by making it unavailable to intended users.
With so many dangers that confront the United States, it is impossible to know all type of attacks that can happen in the cyber world. There can be combinations of not only known but also unknown vulnerabilities and attacks that makes it hard for the United States to protect its self and there classified information. “We face nation states, terrorist networks, organized criminal groups, individuals, and other cyber actors with varying combinations of a...
Cyber warfare, the use of computers to fight in cyberspace, is both effective in playing offense and defense in a modern day war. “Cyber war uses computer software to attack an enemy’s computer systems” (Smith). In today’s world, there is cyber warfare all over the place, you just cannot see it. Cyber warfare takes place in the “cyber realm” also known as the internet. The people that take part in the online “war” are the hackers, and their victims. The hackers can take control of their victim’s computer in a whole bunch of different ways. They can do anything from Cross-Site Scripting to SQL Injecting to even stealing your passwords to bank accounts, credit cards and more! Online warfare has grown massively over the years. In the earlier years, the hacker would take control of the computer and see what you were doing. Now, hackers can send crippling virus’s to your computer or the maintenance building of a corporation and shut it down for quite a while.
Sharp Parker, A. (2009). Cyberterrorism: The Emerging Worldwide Threat. In D. Canter, The Faces of Terrorism: Multidisciplinary Perspectives (pp. 245-255). Malden: John Wiley & Sons Ltd.
Dang, S. (2011). The Prevention of Cyberterrorism and Cyberwar. Retrieved January 26, 2014 from http://al.odu.edu/mun/docs/Issue%20brief%202011%20-%20The%20Prevention%20of%20Cyberterrorism%20and%20Cyberwar.pdf
The power to disable an enemy force without ever having to fire a shot might be closer than we think. While no one knows exactly what the future holds, it seems viruses, Trojans, and worms will continue to be used in an effort to attack and disable opposing forces across the world. If the United States wants to remain in an advantageous position in the information war, spending towards cyber security in our nation will have to increase. This book provides an enjoyable start to learning about information warfare, historical examples of how information has shaped battles, and what to expect in the years to come.
Wilson, C. (2007). Information Operations, Electronic Warfare, And Cyberwar: Capabilities And Related Policy Issues. Retrieved from http://www.fas.org/sgp/crs/natsec/RL31787.pdf
Weaver, Nicholas. "A Close Look at the NSA’s Most Powerful Internet Attack Tool." Wired.com. Conde Nast Digital, 14 Mar. 2011. Web. 15 Mar. 2014.
Murphy, D. (2010). War is war? the utility of cyberspace operations in the contemporary operational environment. Center for Strategic Leadership, U.S. Army War College , 1-10. Retrieved from http://www.infowar-monitor.net/2010/02/war-is-war-a-workshop-on-the-strategic-utility-of-cyberspace-operations-in-the-contemporary-operational-environment/
National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face.