Wednesday, July 17, 2019
Cyber Terrorism and Information Warfare
As the employment of instruction processing system engineering science be scrape ups wide, large number waste tended to work turn aside(a) them al well-nigh(prenominal)(prenominal) for beneficial and devastating purposes. As the partly of figurer engine room fuck offs much(prenominal), they continue to be utilize for more labyrinthian and inter-reliant threats to humanity. The do of computer applied science for unhealthful purposes takes place in the spend a penny of cyber crime, cyber meet of mold of act of act of terrorist act and culture contendf atomic number 18. The focus of this typography is on cyber crime and training state of state of war. The two present a number of similarities as well as differences.They ar both applications of computer and schooling engineering that ar in subprogram in the companionship in the data era. culture has been relied upon in opposite orbits in different countries and roughly the world. Thi s has made selective education a precise powerful tool for the economy of legion(predicate) countries. Information has in worry manner become a stern for criminal activities same act of terrorist act and a object lens to betroth war (Lewis, 2002). This paper discusses the similarities and differences between cyber terrorist act and cultivation warf atomic number 18. The paper begins with the description of the twain concepts. Cyber terrorist actCyber terrorism is the commit of computing resources to engage in terrorist activities. It empennage also be defined as the calculated use of computers or computing ne twainrks stop completely oered at rail ating, or to bring forward social, stintingal, political or ideological, or much(prenominal) goals. People pull in tended to use the privateness afforded by cyberspace to wage terrorism activities towards communities or an entire field. This has tended to drive threat and panic to people with erupt physical front of the attacker. The terrorists victimization cyberspace stone pit computers and development to cause harm and monetary value to the puted sort out or nation. at that place necessitate been cl commits by approximately particularions of scholars that cyber terrorism does non exist and that what is referred to by the use of this term is instruction warf ar. They nonice that it is not achievable to use computer technology to wage sombre harm or damage in a existence due to the availability of tutelary technology. However, it is a fact is that cyber terrorism is a concept that is applicable in the reliable world of technology (Brenner, 2006). Information war Information warf be on the separate hand is defined as the use of computer technology to wage war.It asshole also be defined as the use and management of entropy and technology in order to gain a competitive advantage e genuinelyplace whizzs adversaries. Information send word be manipulated in various expressions to project that one soil gains an edge over its opponents. Information has become a rattling all important(p) tool for use in different aspects of human life. Information has come to be utilise as a powerful weapon in succession of clashes or conflicts. This warf atomic number 18 is closely associated with mental war. The attack res publica object lenss the education domain of the republic that it is up against (Lewis, 2002).Similarities Both cyber terrorism and cyber war admit use of tuition technology and/ or ne devilrks to carry out their objectives. Regardless of their difference in objectives, randomness is a critical tool for both cyber terrorism and culture war. Information warfargon plunder be carried out in different ways jamming or hijacking of TV and radio transmissions disabling logistic networks disabling or spoofing confabulation networks of the enemies and sabotaging stock exchange transactions (Lewis, 2002). These are all mode of use of breeding in war.Cyber terrorism laughingstock also take various forms like attacks against networks of the identify group or state of yield threats against a community or commonwealth that are made electronically hacking into systems defacing networks and denying service to the target group. It is clear that both are foul applications of computer and info technology. The users of both cyber terrorism and schooling warfare use and go after the information sector of the target group or country with the aim of make havoc (Brenner, 2006).Both cyber terrorism and information warfare are destructive, but concord not been developed to the level of desolation like the other weapons, much(prenominal) as the bomb. The mixed bag of damage caused by cyber terrorism and information warfare is not large-scale, although the technologies are still be developed. It would not be executable to carry out such a destructive act like the one that happened in the United States , ordinarily known as the September 11 attacks (Che, Deng, Chao & Huang, 2009).Despite the fact that thither are well-nigh remote examples of cyber terrorism and information warfare in the world today, they are not as pronounced as those that use the conventional weapons like bombs. All the examples and instances that are provided on the use of information for warfare and terrorism cannot compare with the use of methods like bombing, air planes and other convectional methods. However, the possible ravaging that is likely to happen due to the maturement in technology cannot be ignored. The two concepts, cyber terrorism and information warfare are based on computer and information technology.It is a known fact that technology is harvest-home at a real speedy rate. As a result, the technology applied in both cyber terrorism and information is not the same way it was when the two concepts were developed. It is also a fact that they are likely to be more complicated and destructiv e. While most countries in that respect are development of cyber warfare capabilities, there are individual factions and groups that are developing cyber terrorism capabilities (Che, Deng, Chao and Huang, 2009). Both cyber terrorism and information warfare are destructive processes that can cause terror and damage in a place or country where they are applied.Despite the fact that cyber terrorism is not likely to cause the kind of wipeout like what took place during the September 11 attacks, they are likely to cause a shelter scare off to the open. For example, it is possible for hackers to wage terrorism attacks by hacking into hospital systems (Brenner, 2006). another(prenominal) way that this can be carried out is by launching sequenced, coordinated attacks closedown down Automatic Teller apparatus systems and other financial systems in selected towns or cities.When this is carried out in a large-scale, it can be realized that this is not a random act, but an organized terr orist attack. This can lead to panic about the surety and economic damage to a country. similar baptismal font with information warfare in spite of the fact that unlike cyber terrorism information warfare is not aimed at harming civilians and properties, it leads to both direct and indirect cause to countries they are aimed at and their citizens. Just like cyber terrorism, information warfare causes panic on the public as well as other economic effects on the country (Collin, 1996).For example, where transmissions are hijacked to pass on loathe information or other destructive information, it is possible for people to be very scared for their security. Attacking economic sectors using information technology during war or as a weapon en dangers the economic status of a country. In fact, paralyzing the information sector of a country leads to great economic costs to that country. This representation that these two applications of computer and information technology are very de structive and costly to the affected country (Lewis, 2002).Both cyber terrorism and information warfare are complex problems that need to be addressed very first in field security policies. They are nice more civilize and require cultivate agent to counter. They are both attacks that can paralyze the alkali of a country completely. The use of information for terrorism and warfare is based on the premise that information has become a very crucial resource in development and has been relied upon by countries and organizations in their daily operations (Collin, 1996).The attackers have come to realize that the best part to hit and raise havoc is the information technology sector. The information technology sector has become the most vulnerable point that can be hit to observe the greatest effect. Studies have found out that susceptibility of information networks and the critical infrastructure have put national security in dire risk. This can be supported by the fast growth in technology and its spreading to the economic sector of m each countries. This is usually the target of cyber terrorism and information warfare.The users of these two applications of computer technology targets where a country pull up stakes feel the most effect when hit. This is no better than the information sector of their target (Brenner, 2006). It is flourishing to spot real-world terrorism moreover as it is to spot real-world warfare. When dealing with real-world acts, terrorism or warfare is easier to find, thus qualification it easier to counter. Where a real-life attack is carried out it is possible to know that the government is either dealing with terrorism or warfare. Simply put, it is easy to identify terrorism or warfare in the real-world.This is not the case with cyber terrorism or cyber warfare. Where these takes place, it is not possible to at once identify what one is dealing with. at that place are no people who are physically available to carry out the acts . When a real-world terrorist attack is carried out, there result be a suicide hacek who hijacks a plane or bombs a building. In real-world warfare, there are armament personnel with sign attire and quality badge. This way, it forget be possible to split that it was a terrorist attack or war against a particular group or country.This is not the case with cyber terrorism and information warfare (Lewis, 2002). The activities are carried in seclusion and most of the times unless roughone claims to be involved, it faculty be difficult to identify the perpetrators. In case of information warfare, it might be hard to identify the country involved in the attacks. It is then possible that a country could be a target of cyber terrorism or information warfare and not even be aware of it. The two applications are complex and cannot be easily identified and dealt with (Che, Deng, Chao & Huang, 2009). DifferencesThe aboriginal focus of information warfare is not to inflict injuries or death to civilians and property. Information warfare is not aimed at change or intimidating civilians. Cyber terrorism is aimed at the achievement of a particular objective. This is through mostly through intimidation and any other actor as colossal as the message is communicated. Injuring people, causation death, and modify property is one of the ways used to communicate the message. They achieve their objectives by destroying as much life and property as possible. Cyber terrorists do not mind the lives that will be lost or the damage that will be caused in the process.For instant, the terrorist attacks in Romania. This happened at an Antarctic research meaning where terrorists accessed the computer resources that controlled life support systems. In the process, the lives of 58 scientists were put in danger (Kalathil & Boas, 2003). However, the perpetrators were stopped before a serious harm was caused. terrorism generally is a destructive act that is carried out for self-l oving purposes, while information warfare is an act that is aimed at protect a country from destruction by its enemies (Lewis, 2002).Information warfare is levelheaded and mostly designed by the ministry of excuse as a weapon of defending team to a nation in time of war. As already mentioned, it is the use of technology to gain competitive advantage over the opponents. This means that it is not an illegal means of attack, like cyber terrorism. Most of the time, information warfare is carried out by the conventional forces force. There are for example some nations that have trained or are training people who are referred to as hacker warriors. These hacker warriors are used in time of war to wage attacks against enemy nation-states.Cyber terrorism on the other hand is dangerous and un law-abiding attacks towards a target group to further some selfish objectives. Cyber terrorism is carried out by people who are part of a faction that is united by an contract to a particular polit ical philosophy. The distinguishing figure from cyber terrorism is that war is a fight between countries or nations states (Che, Deng, Chao & Huang, 2009). Information warfare is meant to be a collateral event. This means that the information attacks are aimed at protecting ones country and its citizen.During war, the aim of the fighters is to protect ones country and its people from adversaries. This means that the objective of information warfare is very different from that of cyber terrorism. In most cases, cyber terrorism is not a collateral event. It is used for selfish objectives of the attacking groups. It is also important to note that most of the times cyber terrorism is not initiated by lawful combatants. This means that the perpetrators do not operate legally as is the case during war (Brenner, 2006).Cyber terrorism is aimed at causing damage and harm to a target group for a particular objective of the attacking groups. Some of the objectives of cyber terrorism imply id eological, political, religious, and in some cases economical. Unlike in cyber terrorism, war is restricted to attacks between groups (armies) who act on behalf of their countries in the war. The use of technology in this case is aimed at the the States or armies of the enemy nations. In warfare, the use of information is rational and justifiable, unlike the use of terrorism attacks where the acts are irrational and cannot be justified (Lewis, 2002).Cyber terrorism is basically one-sided. This means that in most cases cyber terrorism cannot be reciprocated. In most cases, its anonymity characteristic makes it hard to find out the perpetrator(s). Cyber terrorism is aimed at a specific population to further the objectives of the attacker. On the other hand, information warfare is aimed at attacking adversaries. This means that unlike cyber terrorism, it is aimed at triumphing against ones enemies. It is used against opponents during war and is just peculiar(a) to that purpose (Che, Deng, Chao & Huang, 2009).Conclusion This aim of this paper was to make a comparison and contraction of the two concepts that apply information computer technology, cyber terrorism and information warfare. The two concepts differ in definition because while cyber terrorism is the use of computing resources to engage in terrorist activities, information warfare is defined as the use of computer technology to wage war. These concepts have a lot in common, from existence based on computer technology, to the kind of effects they are likely to cause to a country and its people.They are both destructive effects of information and computer technology. They are however different from their motive, to the kinds of people who carry out the attacks. While cyber terrorism is an unlawful act aimed at causing intimidation in achievement of different objectives, information warfare is a lawful activity carried out by forces personnel aimed at coming out victorious over opponents. These two activ ities have led to a security scare around the world due to the effects that they lead to. They are concepts that are suppositional to be address in national security policies as a matter of urgency.Despite the fact that they have not become so open in the parliamentary law today, with a few remote cases being reported, with the development in technology and over reliance on technology in different sectors, it is possible that they will increase. There is need to develop more sophisticated technologies to counter this. References Brenner, S. (2006). C3 Cyber crime, cyber terrorism and cyber warfare. Retrieved on whitethorn 11, 2010 from http//cyb3rcrim3. blogspot. com/2006/06/c3-cybercrime-cyberterrorism and. html Che, H. , Deng, D. , Chao, H. & Huang, Y. (2009).Next Generation of Terrorism Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears, Journal of Universal calculating machine Science, vol. 15, no. 12. Collin, B. (1996). The future of cyber terrorism. Pa per presented at the 11th Annual International Symposium on Criminal Justice Issues, University of Illinois at Chicago. Kalathil, S. & Boas, T. (2003). propagate networks, closed regimes. Washington DC Brookings. Lewis, J. (2002). Assessing the Risks of Cyber Terrorism, Cyber war and Other Cyber Threats, Washington DC center of attention for Strategic and International Studies.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.