Question
The 21st century has seen warfare adopt many new faces, among those the use of the Internet as a weapon. Explore an e-warfare incident and discuss its success or failure. In your answer detail how you as a network manager could protect your organisation against e-warfare.
Abstract
In the following essay I will define ‘E-warfare’ and outline types of attacks which are associated with it. I will identify an incident which has taken place and discuss whether the incident was successful or failed. I will then attempt to give a detailed explanation of how if I was an appointed network manager, that I would protect an organization against e-warfare. I use examples when necessary to provide a realistic appreciation of the use of
…show more content…
Governments, businesses and individuals are using the internet for day-to-day activities and any disruption can have devastating effects. This dependence on electronic information exchange, whilst having its positive side, also has a big negative with security issues. The ease at which a website or news portal can be attacked and taken down by almost any person with an internet connection is of huge concern. The various methods of electronic attacks which can take shape bring forward the subject of electronic warfare and how it impacts society. Various attacks can take place, although the distributed denial-of-service attack is the one of focus due to its eafse and its common appearance on the internet.
A denial of service (DoS) attack is an intentional action designed to prevent legitimate users from making use of a computer service (Quinn 2006). A DoS attack may involve unauthorized access to one or more computer systems. The aim of a DoS attack is to disrupt a computer servers ability to respond to its clients. Interfering with the normal use of computer service’s can result in significant harm. For example a company selling products and services over the internet may lose business or a military organization may find its communications disrupted. In a distributed denial of service (DDoS) attack, the attacker gains access to thousands of computers. The
Denial of service – Denial of service or DOS is an attempt to make a machine or network unavailable to its users. The services that were available to the user wouldn’t be available anymore. Although the result of a DOS attack does not lead to data theft. However a great deal of time and money can cost the company. An example of a service being stopped is email, or can be a loss of network connectivity. There could be no access to shared storage and no one would be able to access the internet while the DOS attack.
With cyber war, nations are able to skip the battlefield. Gone are the days where troops line up across from each other hoping to do damage to the other. Clarke explains that people, industries, governments, companies and organizations can be possible targets and are vulnerable to these attacks. Keeping that in mind should help these targets become defensive minded and shield off attacks before they happen. As we all know, the prevention is better than the
Adam Segal’s “The Hacked World Order” reveals many prevalent issues in today’s technologically centered society. Starting at Year Zero, June 2012 to June 2013, the battle over cyberspace witnessed world-changing cyberattacks. This was accomplished due to the fact that nearly 75% of the world’s population has easy access to a mobile phone, and the Internet connects nearly 40% of the total human population, which is nearly 2.7 billion people. With that being said, cyberattacks are becoming a more realistic form of terror.
Our everyday lives are consumed with things on the internet or with the internet. We rely heavily on the internet to the point where we are fundamentally depend on the internet. With that being said this brings a lot of cybersecurity issues. Cybersecurity issues will challenge any and everyone. Cybersecurity will affect business, governments and also the individual. Business firms and governments will face threats that a few years ago were only thought of as science fiction. To battle against these threats cybersecurity was formed and with the formation of cybersecurity, it has become an industry.
Denial of Service (DoS) attack is a very common cyber menace that renders websites and other online means inaccessible to intended users. There are various types of DoS threats and nearly all directly target the core server structure. Others abuse weaknesses in application and communication proprieties. DoS is also used as a cover-up for other wicked actions, and to take down security applications like web firewalls. A prosperous DoS attack is very obvious and impacts the entire online user base.
As the future of warfare becomes more sophisticated, what will be the military technology of tomorrow? The North Atlantic Treaty Organization, NATO, believes that there are three possible answers to that question: nuclear warfare, biological/chemical warfare, or cyber warfare. While nuclear and biological warfare is conducted on a battlefield, cyber warfare operates via the Internet and computers. All of these weapons have the same destructive potential, but the circumstances surrounding
In the early 2000’s new criminal opportunities arose by attacking Web sites. Denial of Service (DoS) attacks took place by having large numbers of computers accessing a Web site at the same time. This provided cyber criminals with two things, global visibility, and financial opportunity. As technologies evolve and advance, so do the abilities of the hackers. Now, the goal is to stay one step ahead. It is not a matter of if a system can get hacked, but rather a question of when.
Most nations today fear terror attacks that include bombing use of reinforcements like machines guns and other firearms. This is because terror attacks most of the times leave many people dead and others disabled while others are left without families. However, there is another attack today in many nations that can be destructive like a terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all systems connected to cyber networks fail to work (Rhodes 20). An example is the Morris worm that affected the world cyber infrastructures and caused them to slow down to a position of being impractical. Therefore, as a result of these cyber-attacks resources are being established and designed to help counter the attacks.
For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous and space-less digital environment. Both state and non-state actors have already embraced this new realm and utilized both legal and illegal means to further facilitate their interests. What complicates cyber security further is as states attempt to protect themselves from cyber-warfare, private
The branches of the military, for a couple generations, have always been the Army, Navy, Air force, Marine Corps, and the Coast Guard; however, in an ever evolving digital world, the notion that outer space would be the next military front is being rapidly replaced by the idea that cyber space will be the next arms race. The United States has been defending attacks on their infrastructure day after day, night after night, when one hacker on one side of the world sleeps, another takes their place to attempt to compromise the US government. The motives may range from a political ‘hacktivist’ trying to prove a point, to an economic spy, trying to gain a competitive edge on its more upstart rivals, to an attempt to control the United States
Denial-of-service is an attack aimed to refuse access for legitimate users and disrupt service availability according to www.msdn.microsoft.com. This type of security threat according to www.tech.co.uk is rapidly increasing on the Internet due to open doors on Websites. By using the Internet, companies increase the risk of denial of service attack. Denial of service can also be caused by too many connected to a server at the same making run slow or unavailable to others. People who deliberately abuse a network server are often difficult to track down.
Prevalent to the current trend now is the dependency of the society on Information technology and communication systems. Every aspect of human life is one way or the other linked and controlled by information technology tools. The importance of information technology cannot be over emphasized as its unavailability could lead to a form of disaster or the other. Pivotal infrastructures like finance, healthcare, education and security are driven by information technology. However, information technology and its benefits are accompanied by vulnerabilities and risks that can be exploited by people with the necessary technical skills. Individuals like ‘Hackers’ and ‘Cyber Terrorist’ can cause disruption to information systems, commit financial fraud and also attack computers and networks. These attacks and disruptions could result to violence against people and properties. In some cases, death, serious injuries and severe economic loss could occur as a result of these attacks.
strategies. For the military, an overhaul of the whole concept of Defence has gradually changed as cyber security is streamlined into defence policy coupled with economic influence and globalisation. ‘In the military, information and intelligence operations, routine administrative functions, and a wide array of everyday jobs have been increasingly developed and transformed with the support of interconnected electro-electronic devices’ .
The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individuals, businesses, and governments risk losing that asset.
The Internet has had security issues since its earliest days as a pure research project. Indeed, even today, following quite a long while and requests of size of development, regardless it has security issues. It is being utilized for a reason for which it was never proposed: business. It is to some degree unexpected that the early Internet was outline as a model for a command and control network that could resist blackouts coming about because of foe activities, yet it can 't avoid school students. Outline a framework that would be appropriate for oppose that assault from inside yet developing and advancing dangerously fast is likely conceivable. Insightful foundation changes are required, and once you have accomplished a specific measure of size, the sheer invisibility of the introduced base may make it difficult to apply repairs. As universally useful scripts were presented on both the customer and the server 's sides, the perils of inadvertent and malignant misuse developed. It didn 't take long for the Web the move from established researchers to the business world. Now, the security dangers turned out to be a great deal more genuine. The motivator for malevolent aggressors to endeavor vulnerabilities in the basic advances is at an untouched high. Whenever business and benefit are in question, we can 't expect anything not exactly the most committed and ingenious aggressors writing their most extreme to take, cheat, and perform malevolence against clients of the Web.