Verified Document

Computer Security Information Warfare Iw  Research Paper

The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities.

The creation of an effective national security strategy as well as the creation of an elaborate national military strategy.

Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive method used is used whenever there is a need to come up with ways of solving various problems. The significance of this technique is due to the fact that there is a need of coming up with general steps that are aimed at the identification and creation of an elaborate strategy that is aimed at reducing all the negative effects of information warfare. The objective is to come up with appropriate methods of. As a result, this is useful in helping, to provide an initial first step for identifying and controlling the problem.

Freedman (1998) comes up with a discussion of the rapidly changing facets of military warfare. The amount of conflict is noted to be dependent on the ability of the various nations trying to prevent the super powers from intervening in their various areas of interests. In such a situation, the smaller nations that are rogue may decide to use information warfare in order to achieve their ulterior motives. It is the nature of the smaller nations to engage in various tactics in order to perpetrate their evil causes. What the do is to launch attacks on the information technology infrastructure of the larger nations in order to cause confusion. The disruption caused can result in a lot of disruption that can result in military conflict. The information acquired can also be used by the smaller nations in enticing the major nations into coming into conflict with each other. This is usually through the provision of false information. The techniques used by Freedman are qualitative as well as empirical. The significance of this is that the information acquired can be used to confirm and corroborate other highlighted sources regarding the possible causes as well as effects of information warfare. The information acquired can be beneficial to the smaller nations since it might prevent them from going into war with major nations. The phenomenon of information according to this study has several beneficial effects to the smaller nations.

Arquilla (2001) discusses the various methods that terrorists organizations can use the power of information technology in order to improve both their recruiting process as well as enhance the way they control, their various cells . This is mainly due to the fact that technology has improved the away groups such as Hezbollah and Al Qaeda operates. Through technology, the terrorist groups are able to effectively reach out to various new followers and members in various countries. The terrorist networks are able to effectively encrypt their messages and also deliver various instructions to be used to effectively transport and use various encrypted disks. This in turn has resulted in various terrorist organizations being able to easily breach the counter terrorist measure put in place by various governments and institutions. This is through the use of technology in coming up with an effective technique of communicating with each other as well, as to reach out to several sympathizers and new members. The method used here is qualitative. The methodology used in this study is historical. The study involved an analysis of how the various terrorist organizations are using technology in order to commit acts of information warfare. The significance of this is to show how various terrorist organizations are turning to technology in order to perpetrate acts of cyber terrorism as part of their overall terrorist strategies. The information acquired from the study can therefore be used to effectively establish a pattern/recognize a plan necessary to combat future cases of information warfare in the terrorist domains.

Devost (2005) focuses on the potential impact of information warfare on the United States of America. This according to him is due to the fact that the country relies on the use of technology in carrying out several of its activities. This fact alone explains the rise in the number of points of vulnerability. The article focuses on the way the U.S. is exposed to various forms of cyber attacks emanating from various other nations. In such situations, the possibilities of cyber attacks are usually reduced. This is because of the fact that both retaliation and interdependence of these nations are kind of low as a result only serves to their disadvantage. Devost does believe...

The approach discussed here is very popular due to the following facts.
The terrorist are able to plan and execute their plans undetected.

There is a large number of young persons who are joining the terrorist networks and coupled with the rise in the number of youth who are involved in the use of technology makes the threats widespread.

The carrying out of information warfare involves the use of very little financial resources.

The planning and execution of cyber terrorism requires very little physical resources.

The method used by the author is quantitative and involved the use of empirical techniques in the examination of the various subjects. The significance of the study was to come up with an identification of the most likely use of information warfare by cyber terrorist in order advance their aims. This paper point out the fact that the larger nations are most likely not going tom participate in information warfare in order to advance their options. This is due to the fact that they may be fearful of the potential damage this could bring to them as a result of negative implications. This therefore makes the chances of such attacks low. The use of information warfare in order to advance ulterior motives against other nations therefore remains with smaller terrorist organizations who end up using it in order to result to negative economic implications as well as to create fear in these countries.

Yoshihara ( 2001) discusses the various effects that Chinese information warfare can pose to the United States of America. He identified the various threat levels and sources that the threats can pose to the country in the future. This according to him is due to the fact that United States has it attention focused somewhere else. The author points out that the Chinese government can most likely use the information they acquire in order to cause harm to Taiwan. In such a situation, China would utilize the information they have acquired through information warfare to launch hack attacks and disable various integral systems during conflicts. This would result in attack of Taiwan with the usually military resources in an effort to create a crisis in the country. Another reality is that the United States military is continuously dependent / reliant on technology. The possibility or scenario is that should China launch an attack through the disabling of the early moments of the attack/conflict, then they can effectively delay the arrival of the other reinforcing military aids such as that of the United States and NATO forces. Should this occur, there is a high chance that China would easily succeed in attacking their enemy Taiwan. This would mean that the response from other nations would arrive late and China would have succeeded in capturing Taiwan. The method employed by Yoshihara is quantitative and used an empirical technique. The significance of this study is to highlight the possibility of trouble that can be caused by China by means of information warfare. The study can be used in I the formulation of the future military policies by various governments.

Lewis (2002) studies the various forms of cyber attacks and their effects on both the national security and public policy making. The paper studies looks at a certain set of issues that are related to the way information technology can be used in carrying out cyber attacks as well as cyber terrorism on various critical public and private infrastructure as well as the possible implications of such attacks on the national security. The paper clearly describes how a hostile group of individuals or nations can come together to exploit the various vulnerabilities in the information technology infrastructure as well as the way such attacks and breaches can affect the national security. The author point out that the fact that the rapid rate of adoption of and its use in the various aspects of the economy points out the reason why it is wise to assume the assumptions of risks to be real. The paper does not however provide a full assessment .The paper does however provide four integral elements that must be reassessed in order to avoid cases of cyber terrorism. The first element involves the putting of the cyber warfare and cyber terrorism in a historical context. This involves an evaluation of the infrastructure that is mostly at risk. Then there is the coining of the strategies to be…

Sources used in this document:
Bibliography

Arquilla, J. (2001). The Networking of Terror in the Information Age. Networks and Net Wars. Santa Monica, CA: Rand. 29 -- 41.

Ahern, M, (2003).Control System Security Must Be Updated in This Age of Cyber Terrorism. Electric Light & Power, July 81-7, pp. 13.

Browning, G.(2001). "Filling the Ranks- Agencies Scramble for Infosec Experts"

http://www.fcw.com/fcw/articles/2001/1203/mgt-ranks-12-03-01.asp
http://www.terrorismanswers.com/terrorism/cyberterrorism.html.
Devost, M (2005). Current and Emerging Threats to Information Technology System. Business Briefing Global Security System, 20 -- 28. http://www.devost.net/papers/business-briefing.pdf
Freedman, L. (1998). The Changing Forms of Military Conflict. Survival 40 (4), 39 -- 56. http://www.informaworld.com/smpp/content~db=all~content=a713660011
http://proc.isecon.org/2004/3412/ISECON.2004.Jain.pdf
Knapp, K. (2006). Cyber Warfare Threatens Corporations. Retrieved July 24, 2010 from Info Sec Today website: http://infosectoday.com/Articles/cyberwarfare.pdf Moore, C. (2004). Preparing the Virtual Battlefield for War. Retrieved July 24, 2010 from DTIC website: http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA426069
Molander, R. (1996). Conclusions. Strategic Information Warfare. Santa Monica, CA: Rand, 41 -- 42. http://www.qascores.org/pubs/monograph_reports/MR661/MR661.pdf
http://www3.oup.co.uk/adelph/hdb/Volume_359/Issue_01/
http://www.sans.org/reading_room/whitepapers/warfare/information-warfare-analysis-threat-cyberterrorism-critical-infrastruc_821
http://www.cluteinstitute-onlinejournals.com/PDFs/2005111.pdf
http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf
http://www.dodccrp.org/files/Libicki_What_Is.pdf
Yoshihara, T. (2001). Chinese Information Warfare. Retrieved July 24, 2010 from Strategic Studies Institute website: http://www.strategicstudiesinstitute.army.mil/pdffiles/pub62.pdf
http://www.nap.edu/openbook.php?record_id=11848&page=46#p20012eda8960046001
http://www.wired.com/dangerroom/2010/06/alleged-spies-hid-secret-messages-on-public-websites/
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Warfare
Words: 2405 Length: 9 Document Type: Term Paper

Warfare: An Overview In today's age, traditional warfare, though a major player as we see in the Iraq war, has in some arenas taken a back seat to information warfare. By definition, information warfare is the offensive and even defensive utilization of information and information systems to deny, exploit, corrupt or destroy an adversary's information, information-based processes, information systems and computer-based networks while protecting one's own. Parties use information warfare to

Information Security Training Program
Words: 3414 Length: 12 Document Type: Research Paper

Federal Information Security Management Act (FISMA) The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures

Information Technology Summary and Critique
Words: 975 Length: 3 Document Type: Term Paper

End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a

Counter the New Terrorism Threat
Words: 3129 Length: 10 Document Type: Term Paper

This is not an isolated incident, many experts believe there are many other biological weapons available to terrorist organizations, and the biggest problem they face is how do disperse them effectively. Many considerations must be handled in order to control these types of attacks. First, the country must attempt to block these items from entering the country. Intelligence, monitoring, infiltration, and higher security at the nation's borders and ports can fend

Persistent Threat Historical Background of
Words: 5786 Length: 20 Document Type: Research Paper

According to Toronto Star reporter Stephan Handelman in an article printed in 2005, the U.S. senior intelligence analysts consider China to be the greatest long-term threat to U.S. stability. China's military force and computer intelligence has reached its peak. Both the Europeans and the U.S. agree that the expansion of the Chinese military is more than "worrisome." Another article posted on November 16, 2007 by the Washington Post claims that spying

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now