Abdul Munshi
CSC-288-DL Network Security


We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

As the use of technology increases
overtime, the use of the internet and cyber space is also rapidly increasing.
Cyber space is now a part of our daily routine. From banking, entertainment,
transport even our social lives are dependent on the internet. This over use of
the internet comes with a price and that may come in the form of virus, worms,
hacking and identity theft. The open use of cyber space has not just connected
the entire world with speed and ease but has also left the world open to
hackers and other individual out for their selfish motives. This paper will try to define what cyber
warfare and what are its impacts on modern society.

Koblentz and Mazanec have defined cyber
warfare as ‘the use of computer networks to disrupt, deny, degrade, or destroy
information resident in enemy computers and computer networks, or the computers
and networks themselves’ (Gregory D. Koblentz & Brian M. Mazanec 2013). As
technology becomes more and more advanced so does the ability to conduct war. Criminals
from around the globe have targeted both government and private networks to
start information and cyber warfare which also entail attacks that are backed
by political and military forces from around the globe.

The world
began to see the dangers caused by modern weapons in World War I when chemical
weapons were introduced. After that in World War II, nations developed nuclear
weapons which led to the destruction of 2 entire cities. Today,
in the war on terror, the US has unmanned drones which can be used to strike terrorists
without endangering the lives of our soldiers. The ability to
conduct warfare via advanced technological methods has contributed to an increase
in information security awareness and the need for one to protect an entities
infrastructure. Subsequently, with the advent of cyber warfare there
has been and increased risk of threats and vulnerabilities to systems that hold
or transmit data.

The threat of a cyber-attack on our nation’s
infrastructure is now viewed by the majority of American’s as an imminent and
credible one that demands greater resources and spending. A recent survey shows
that 92% of all Americans agree that cyber warfare is a dangerous threat to the
public utilities, transportation and government infrastructure. Cyber warfare
is viewed as an imminent threat in light of increased news coverage of recent
attacks. 60% of Americans are also in favor of increased government spending in
defense of such attacks. However, there is a divide amongst the people as to
whether the corporations should be responsible for their own defense or if this
is the governments’ responsibility (Americans Willing to Spend More to Thwart
Cyber Attacks: Survey, 2013, p. 1).

When it
comes to cyber security, any attack which is conducted against the network of a
government organization or even the private sector involves one to able to
corrupt and control a computer network or any other type of target. For example
unstructured level has the ability to perform basic hacks against individual networks
or systems using tools which are already out there for one to use. The advanced
structured level means the attacker has the capability to perform more advanced
attacks against multiple systems and can modify or create basic hacking tools.
The final level is the most complex level as it is described as the hacker
having the ability to coordinate attacks that cause mass disruption against
defenses, and the ability to create sophisticated hacking tools.

terrorism is now an enormous concern to our national and international
security, the most prevalent reason being that cyber terrorists now have the
capability to shut down all of the major systems that American citizens depend
upon on a daily basis. If even one of these systems were to be compromised, the
effects would be devastating to our nation, as they could potentially shut it
down with the click of a button.

A recent
example of war in cyberspace is the conflict between China and Taiwan2, in the
year 2000 Chinese hackers vandalized many government websites of Taiwan. And in
retaliation the Taiwanese hackers plastered china’s railway ministry with
pictures of the Taiwanese flag and national anthem. After the incident the Taiwanese
government respondent by saying ‘they have learnt the lessons of previous
attacks are now on a constant state of alert for signs of interference’. In
august the same year hackers on both sides of the Taiwanese Straits engaged
each other in a fierce cyberwar after the then Taiwan President, Lee Teng-hui,
suggested Taiwan’s relationship with Beijing conducted on
“state-to-state” lines. And in response to this statement a Chinese
hacker posted a message on the Taiwanese

website saying ‘Taiwan is an inalienable part of Chinese territory and will
always be. The Taiwan Government headed by President Lee cannot deny it. Only
one China exists and only one China


the internet’s inception, it was to be originally to be used as a failsafe for
communication in case of a military disaster. Now it is used for the
communication of many people in their daily lives. With that, however, comes
the possibility that this tool can, and has, been misused for the purpose of
war. Stuxnet-like worms, espionage, hardware failure are all possibility’s in a
global network, one that may be nigh impossible to fully secure, but isn’t as
dangerous as one hears on the news. Cyber warfare is an ever looming threat,
but with the proper security, and a dash of common sense, we may never have to
look that doomsday scenario eye to eye. We know now our infrastructure is
insecure, and if it is fixed today, well the technology is still young, and the
world is relatively stable, we might not have to worry as much about fixing it
in the future when war is looming. The United States government is beefing up
its cyber security now, so it can focus on prevention later, an old saying
states, an ounce of prevention is worth a pound of cure, and if China, Russia
and Iran can learn to control their hackers, we may have hope yet. ?








Works Cited

D. Koblentz & Brian M. Mazanec (2013) Viral Warfare: The
SecurityImplications of Cyber and Biological Weapons, Comparative Strategy,
32:5, 418-434, DOI:10.1080/01495933.2013.821845


Written by

I'm Colleen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out