Cyber War

Read Complete Research Material

CYBER WAR

Information Warfare and Cyber Terrorism

[Institution name]

Information Warfare and Cyber Terrorism

Introduction

The network is becoming the ideal place for criminals and terrorists to carry out their actions and activities. Hence, cybercrime and cyber terrorism have become two of the most serious threats seem to haunt Western societies. For this reason, the course of this paper has been dedicated to studying by outlining three outstanding cases on information warfare or cyber terrorism Russian denial-of-service attack on the country of Estonia in 2007, Cyber attacks during the 2008 South Ossetia war between Georgia and Russia, and U.S State Department Compromised Computers in the East Asia Bureau in July 2006.

Moreover, the impact of the crimes on the victims and their measures to cope up with such crimes in the future will also be a part of the paper. We will also discuss the mechanisms critically important to preventing the recurrence of these types of cyber attacks in the future.

Information Warfare and Cyber Terrorism

Cyber warfare has been defined as the process of nation-state to introduce computers of other countries or networks to cause damage or destruction. She became so important to military operations on land, sea, air and space.

Cyber warfare is a form of warfare that occurs on computers and the Internet, by electronic means rather than physical. Cyber war, also known to be a growing force in the international community and many countries regularly runs Cyber warfare exercises and games which will be prepared for attacks from their enemies genuine.

Russian denial-of-service attack on the country of Estonia in 2007

The cyber attack suffered by the Estonian computers is one of the most popular on the Internet, for its efficiency and simplicity. Any malicious hacker and can topple a well-formed web page in seconds, as the attack is impossible to predict and is not directed against the same page but difficult to defend against an action over the bandwidth.

It is called Distributed Denial of Service (DDoS), and aims to prevent access to a web page, collapsed with millions of requests (“Denial-of-Service”, 2007). To do this, attackers send a virus to thousands of computers connected to Internet users, allowing them to open a backdoor to control that computer, which they call zombie.

After infection of thousands of computers, the hacker can use the information as they want. In the case of a DDoS, they order them to visit the page you want to attack at the same time, causing ...
Related Ads