preview

The Field Of International Security Studies

Good Essays

Technical Terminology

In understanding the field of international security studies, an array of technical terms and concepts must first be defined. Throughout this research paper I will be using various terminology relating to the cyberspace and its struggles when evaluating the magnitude of potential cyber threats.
Lucas Kello is an associate of the Science, Technology, and Public Policy Program’s of the Cyber Project for Harvard University’s Cyber Project. Kello is a Harvard undergrad with a master 's and doctorate in International Relations from Oxford University. Kello states that certain aspects of the cyberspace - such as the analysis of code - belong to computer specialists. Kello also points out that other scholars tend to …show more content…

Malware : Commonly referred to as malicious software that is designed to interrupt computer functionality and/or to gain access to sensitive data. As an umbrella term, malware includes things such computer viruses, Trojans, spyware, and other malicious programs. Malware can and often is designed to create access ways into an adversary 's computer or to attack it, sometimes both. Therefore, using malware is seen as an instrument of hostility as it can also be implied. Almost every cyber hostile action uses malware.
Botnets : Botnets have been described as the “Swiss Army knives of the underground economy” because they are so versatile. Botnets, or “Bot Networks,” can be remotely controlled from the attackers location anywhere in the world. Allowing them to send commands via the Internet to the hundreds or thousands of computers infected with malicious code. As these infected computers are taking “hostage” into actions meant to disrupt or block Internet traffic for the targeted victims, also to harvest information, or to distribute spam, and viruses.
Originally Botnet codes were distributed as infected email attachments, although in recent years users have grown more cautious. In more recent times through technological advancements, attackers, and cyber criminals have changed and advanced their

Get Access