¶ … Warfare: An Overview
In today's age, traditional warfare, though a major player as we see in the Iraq war, has in some arenas taken a back seat to information warfare.
By definition, information warfare is the offensive and even defensive utilization of information and information systems to deny, exploit, corrupt or destroy an adversary's information, information-based processes, information systems and computer-based networks while protecting one's own. Parties use information warfare to gain military, public relations or economic advantage. (www.psycom.net)
Users of information technology are most often nation-states and corporations. For instance, by gaining access to a rival company's databases, a business can get a valuable advantage on price-points and supply chains. Countries can decide how much to spend on military equipment by discovering how much in military stocks adversary nations have.
One major focus recently on information warfare has been hackers. For instance, the most recent generation of mobile phones has proven vulnerable to hackers. This is of course dangerous to anyone who conducts business over cellular telephones at any point. Information on cell lines is suddenly vulnerable to business rivals and suppliers and purchasers.
According to a recent conference in Maylasia, the warning that the latest generation of mobile phones is vulnerable to attack is quite serious. As technology has increased on mobile phones, the entry points into hacking into them has also increased correspondingly, or even exponentially. The temptation is to wonder what kind of information can possibly be intercepted on cell phone waves, but the options are limitless: First, regular business conversations happen on cell phones all the time. Then, with the advent of PDA phones and computer phones (not to mention camera phones), the amount of information interchanged over phones can even include large databases or telephone contact lists, or in the case of some law firms and blackberry-phones, even highly confidential client information.
Experts demonstrated what they say are loopholes in some of the software supplied with the phones, which allows them to be taken over by remote control. The perpetrators can get away with information that can help their clients or themselves win a civil law suit, settle a major litigation, steal a contract from under the feet of a competitor or so much more.
New software which will help tackle unwanted emails, known as spam, can be utilized to protect the mobile phones, but of course this software ups the price for the business and personal consumer. And any additional costs truly mount up, because the securities involved must be put into place for all employees, and the itinerant costs increase exponentially.
A well-known hacker known as Captain Crunch explained in an article on ABC: "There's new development out right now which can detect spam and automatically report spam back to the Internet service provider that originated the spam, pointing out to the Internet service provider the specific machine that was sending the spam," he said. "So the Internet service provider can look up in their logs and records and identify which customer it was who owned that machine and then can notify the customer that there machine is being used and hijacked."
Surely, this protection is welcome, both by mobile phone companies and by users, but is it enough? Time will tell, but if experience serves correctly, it will not be enough. In the hacking game, the old criminal adage holds even truer: Criminals are always one step ahead of law enforcement innovations. Hacker criminals are even a larger leap ahead of the forces that would stop them, given their sense of challenge and love of the game.
Hackers, of course, affect much more than mobile phones alone. Organizational hackers have the power to act as terrorist, have the power to inflict damage that may even dwarf the tragedies of September 11. According to www.csoonline.com, computer security experts have warned of an impending "Digital Pearl Harbor" in which U.S. computers will be hit hard by foreign governments or terrorists employing a variety of electronic attacks. The result will be damage to critical infrastructures, massive economic loss and perhaps worse.
Since the early 1990s, it has been clear that an organized attack over the Internet or other data networks could seriously disrupt not just civilian but military targets as well, thanks to increased interconnections on the information superhighway. In the 1980s, a group of West German hackers broke into more than 40 sensitive computer...
Warfare & Terrorism The proliferation of cyberattacks -- aptly referred to as cyberterrorism -- carried out by criminal miscreants with grudges, shadowy techies with political motives, and other anti-social individuals, represent the new digital wars that threatened personal and state security worldwide. This is not a problem that will go away any time soon, and cyber security officials it seems will always be one or two steps behind the offenders causing
His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive
End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a
Federal Information Security Management Act (FISMA) The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures
Role of Time in Information Assurance The society at large is on the verge of a new era. This new era is the information age which is marked with a major paradigm shift in the area of information assurance. Information assurance has three main attributes: confidentiality, integrity, and availability. All the three tenants of information assurance must be well guarded and maintained in order to bring a marked improvement of both
The Mayans, the Itzcouatl, Tepanecas, the Aztecs of Tenochtitlan were warring civilizations, intolerable of encroachment (Spinden, p. 209). The latter three groups formed defensive alliances, and divided their spoils of war (Spinden, p. 209). Spanish historians often liken Tenochtitlan to the seat of an empire and speak of the ruler as one who had the power of an absolute monarch while other and more recent writers have declared that the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now