Abdul MunshiCSC-288-DL Network SecurityH702632044CyberWarfareAs the use of technology increasesovertime, the use of the internet and cyber space is also rapidly increasing.
Cyber space is now a part of our daily routine. From banking, entertainment,transport even our social lives are dependent on the internet. This over use ofthe internet comes with a price and that may come in the form of virus, worms,hacking and identity theft. The open use of cyber space has not just connectedthe entire world with speed and ease but has also left the world open tohackers and other individual out for their selfish motives. This paper will try to define what cyberwarfare and what are its impacts on modern society.
Koblentz and Mazanec have defined cyberwarfare as ‘the use of computer networks to disrupt, deny, degrade, or destroyinformation resident in enemy computers and computer networks, or the computersand networks themselves’ (Gregory D. Koblentz & Brian M. Mazanec 2013). Astechnology becomes more and more advanced so does the ability to conduct war. Criminalsfrom around the globe have targeted both government and private networks tostart information and cyber warfare which also entail attacks that are backedby political and military forces from around the globe.The worldbegan to see the dangers caused by modern weapons in World War I when chemicalweapons were introduced. After that in World War II, nations developed nuclearweapons which led to the destruction of 2 entire cities. Today,in the war on terror, the US has unmanned drones which can be used to strike terroristswithout endangering the lives of our soldiers.
The ability toconduct warfare via advanced technological methods has contributed to an increasein information security awareness and the need for one to protect an entitiesinfrastructure. Subsequently, with the advent of cyber warfare therehas been and increased risk of threats and vulnerabilities to systems that holdor transmit data.The threat of a cyber-attack on our nation’sinfrastructure is now viewed by the majority of American’s as an imminent andcredible one that demands greater resources and spending. A recent survey showsthat 92% of all Americans agree that cyber warfare is a dangerous threat to thepublic utilities, transportation and government infrastructure. Cyber warfareis viewed as an imminent threat in light of increased news coverage of recentattacks. 60% of Americans are also in favor of increased government spending indefense of such attacks. However, there is a divide amongst the people as towhether the corporations should be responsible for their own defense or if thisis the governments’ responsibility (Americans Willing to Spend More to ThwartCyber Attacks: Survey, 2013, p. 1).
When itcomes to cyber security, any attack which is conducted against the network of agovernment organization or even the private sector involves one to able tocorrupt and control a computer network or any other type of target. For exampleunstructured level has the ability to perform basic hacks against individual networksor systems using tools which are already out there for one to use. The advancedstructured level means the attacker has the capability to perform more advancedattacks against multiple systems and can modify or create basic hacking tools.The final level is the most complex level as it is described as the hackerhaving the ability to coordinate attacks that cause mass disruption againstdefenses, and the ability to create sophisticated hacking tools.Cyberterrorism is now an enormous concern to our national and internationalsecurity, the most prevalent reason being that cyber terrorists now have thecapability to shut down all of the major systems that American citizens dependupon on a daily basis. If even one of these systems were to be compromised, theeffects would be devastating to our nation, as they could potentially shut itdown with the click of a button.
A recentexample of war in cyberspace is the conflict between China and Taiwan2, in theyear 2000 Chinese hackers vandalized many government websites of Taiwan. And inretaliation the Taiwanese hackers plastered china’s railway ministry withpictures of the Taiwanese flag and national anthem. After the incident the Taiwanesegovernment respondent by saying ‘they have learnt the lessons of previousattacks are now on a constant state of alert for signs of interference’. Inaugust the same year hackers on both sides of the Taiwanese Straits engagedeach other in a fierce cyberwar after the then Taiwan President, Lee Teng-hui,suggested Taiwan’s relationship with Beijing conducted on”state-to-state” lines. And in response to this statement a Chinesehacker posted a message on the Taiwanesegovernmentwebsite saying ‘Taiwan is an inalienable part of Chinese territory and willalways be. The Taiwan Government headed by President Lee cannot deny it. Onlyone China exists and only one Chinaisneeded.
” Duringthe internet’s inception, it was to be originally to be used as a failsafe forcommunication in case of a military disaster. Now it is used for thecommunication of many people in their daily lives. With that, however, comesthe possibility that this tool can, and has, been misused for the purpose ofwar. Stuxnet-like worms, espionage, hardware failure are all possibility’s in aglobal network, one that may be nigh impossible to fully secure, but isn’t asdangerous as one hears on the news.
Cyber warfare is an ever looming threat,but with the proper security, and a dash of common sense, we may never have tolook that doomsday scenario eye to eye. We know now our infrastructure isinsecure, and if it is fixed today, well the technology is still young, and theworld is relatively stable, we might not have to worry as much about fixing itin the future when war is looming. The United States government is beefing upits cyber security now, so it can focus on prevention later, an old sayingstates, an ounce of prevention is worth a pound of cure, and if China, Russiaand Iran can learn to control their hackers, we may have hope yet.
? Works CitedGregoryD. Koblentz & Brian M. Mazanec (2013) Viral Warfare: TheSecurityImplications of Cyber and Biological Weapons, Comparative Strategy,32:5, 418-434, DOI:10.1080/01495933.2013.821845(http://dx.doi.org/10.1080/01495933.2013.821845)