Preview

Cyber Warfare Research Paper Essay Example

Powerful Essays
Open Document
Open Document
1244 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Warfare Research Paper Essay Example
Cyber Warfare: The New Battlefield

What is Cyber Warfare?
During the summer of 2010, the US and Israel bilaterally conducted an attack on Iran. It was not, however, a deadly air strike or a special operations task force, but a cyber attack. The file or, worm, was named Stuxnet and is known today as the first cyber attack led in partnership by the United States (Sanger; “Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power,”). As the world has become more reliant on computer technology, so has the way we conduct war. The most recent method of carrying out attacks has been over cyberspace, or the Internet. Cyber warfare is the attack on a particular network of the Internet through the spread of a virus, a worm, or even misinformation. This network may be a central network of a hospital or a nuclear plant, which is what makes it so dangerous. While the attack may not directly harm anybody physically, the effects can be devastating.
What are the methods of Cyber Warfare? Who is responsible?
Cyber warfare has been used in a variety of ways: 1. Attacking a country’s networks 2. Spreading false information 3. Gaining access to military secrets 4. Cyber espionage.
Examples:
* The Stuxnet worm sent to Iranian nuclear facilities. * On Tuesday, April 23, a group declaring themselves the “Syrian Electronic Army” hacked into the Twitter account of the Associated Press and released a Tweet declaring an attack on the White House in which President Barack Obama was injured (Fisher; Syrian hackers claim AP hack that tipped stock market by $136 billion. Is it terrorism?). This of course was false and easily taken down, but the stock market plummeted and $136 billion in equity market value was lost. This simple case of false information caused billions of dollars in damage. * Over the past years, there has been an increasing number of attacks perpetrated by China, in which they have stolen information, military

You May Also Find These Documents Helpful

  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Stuxnet

    • 749 Words
    • 3 Pages

    In further examination of its role in protecting the homeland from this type of attack, US-CERT responded to an ever-increasing barrage of incidents year after year, deploying as they did in response to Stuxnet for a handful of those. US-CERT prioritizes those incidents with the greatest potential for harm and applies its effort there. (Farran, 2012)…

    • 749 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nowadays, medical facilities have more computer based devices than IT companies. As a result, many of these medical devices contain configurable embedded computer systems that can be vulnerable to cyber security breaches. As medical devices are increasingly interconnected, via the Internet, hospital networks, other medical devices, and smartphones, there is an increased risk of cybersecurity breaches, which could affect how a medical device operates.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Why Warfare Is Wrong

    • 764 Words
    • 4 Pages

    The internet is a vast zone where the impossible transforms into the possible. Few can manipulate the internet and use it to cause harm. On August 15, 2012, the world witnessed the largest internet attack on Saudi Aramco, one of the world's largest oil companies. The attack caused "35,000 computers to be wiped or totally destroyed and every office was physically unplugged from the Internet to prevent the virus from spreading further" (Plagiary). The attack caused the entire company, that supplies 10% of the world's oil supplies, to shut down. Multiple companies in Saudi Arabia got denied oil. The effects of the attack fell instantly as shortages of oil, caused riots that injured thousands in the Middle East. The individuals who carried out the attack on Saudi Aramco didn't have to pick up a weapon or annihilate them with bombs to cause a huge blow to the company or to harm those estimated 1,100 souls that who were critically injured in the…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    Americans are becoming more and more codependent on technology. The vast majority of homes in the United States have at least one home personal computer (PC) that is connected to the internet. Americans have gotten accustom to being able to access the internet from their homes. Banking, social media, video teleconferencing and business ventures are all examples of how the internet is being used. The availability of the internet and computers in homes have simplified lives in the United States, however this allows cyber-terrorist to have direct access to the most personal of information. Much like the attacks that took place on September 11th the average American is completely unaware of the vulnerabilities that lye waiting around every corner of cyberspace. Cyber-terrorism not only affects individuals, it can also affect the entire nation. The United States critical infrastructures are becoming more dependent on computer networks for there operations. If security is not stepped up terrorist may be able to disrupt or shut down critical support systems. Americans and American companies must educate themselves on the vulnerabilities that cyber-terrorism presents and begin to work toward securing our networks in the same manner as we do our borders.…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Data Breach Essay

    • 665 Words
    • 3 Pages

    War is a part of the past and the present. In every war there are two sides, each hoping for land, power, or individual rights. When someone brings up the topic of war, images of guns and soldiers come to mind. But what if the war extended into cyberspace? No weapons or ruined battlegrounds, just virtual barriers and coding. It no longer becomes a two sided battle, but instead millions of individuals hidden behind computer screens. Anyone can participate in this, including terrorist groups, hackers, and phishers. And for this reason, everyone is at risk. People are getting away with their crimes because they keep information secret, working anonymously to perform illegal acts using the data stored in cyberspace. The United States government…

    • 665 Words
    • 3 Pages
    Good Essays