Cyber Warfare Research Paper

Superior Essays
“I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We 've created life in our own image.” (Hawking, n.d.) No matter what humans invent it will always end up being used for warfare and computers are no different. Cyber warfare is now commonplace throughout the world because just about any country can do it. This causes it to have many various effects throughout the world.
“Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems.” (Rouse, 2010) Not much is actually known about the effects of cyber warfare because most cases either go undiscovered or are seen as warnings. Some of the more well-known cyber-attacks are stuxnet, equation group, and most recently the Sony Pictures attack. All of these attacks had their reasons for happening, and have had far reaching effects on the world.
Saudi Arabia has long defended its oil lines from physical attacks. However, on August 15,
…show more content…
However, because the letter asked for money rather than political change it is believed that this group has nothing to do with later attacks. The first actual attack was from the “Guardians of Peace” and caused a neon skeleton to appear on several computers belonging to SPE. This attack also had the added benefit of completely erasing everything off of numerous hard drives. Then over the next several days the hackers started to release documents and information with several changes to shed SPE in a bad light. This took place over several weeks so that people would be constantly reminded of Sony’s “transgression.” Then as the movie was getting closer to its theatrical release is when the terrorist threats started to happen. It was because of these threats that most theaters decided to not show the movie. (Haggard & Lindsey,

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The people that set out these attacks were Islamic terrorists and most of them were from Saudi Arabia. The terrorists were supported and helped by Osama Bin Laden and his group called Al-Qaeda (“History”). Osama Bin Laden was a Saudi fugitive who founded Al-Qaeda in 1989. Al-Qaeda was originally formed to fight a jihad, a war or struggle against unbelievers, against the Soviet Union in Afghanistan, but soon turned its attention towards the United States (“Events”). Some of the terrorists had lived in the United States for over a year and had completed flying lessons.…

    • 346 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Moreover, there are other types of cyber-attacks and acts of cyber warfare that are not solely military and defense concentrated, but nevertheless are dangerous. An example of this type of attack is explained in columnists, DJ Summers (2014) article “Fighting in the Cyber Trenches”. In his example, he explains how an honest biomedical company going through the process of creating a new technological innovation may have to wait up to five years to be able to release a new product. On the other hand, a different company who is trying to release the same product may use a hacker to release this new product into the market in as shorter span of time for instance, as 18 months (Summers, 2014). Summers explains how hackers are able to infiltrate…

    • 230 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Cyberwarfare In America

    • 242 Words
    • 1 Pages

    Looking at above, they are the some of important and critical target which comes under cyberwarfare in America. As the term cyberwarfare is not just only applicable to the inside activities of country itself thought it’s not limited to that; cyberwarfare also includes the attacks which are made by other nation. One of the most targeted nation among the countries is United States of America and the most of them comes from the China, including satellite in the space are also attacked by them, with supporting example “In January 2007, China used a grounded-based missile to destroy a defunct weather satellite in orbit some 500 miles above the earth’s surface” (Douglas, and Melik 138). In America, most of their services are depended on the satellites…

    • 242 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    As soon as it was released into the internet, it created havoc in the internet community especially in the USA by knocking out the databases of a major section of companies, corrupted data. This lead to the shutdown of many financials units and caused several billions in damage. The US was not successfully able to link the attack to Al Qaeda who planned 9/11. But they were rumors that it was intentionally released that the warm was released after a week of 9/11 to increase the percentages of damages caused to the US during the recovery stage. Since after the continuous…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Dos Attack Research Paper

    • 580 Words
    • 3 Pages

    The danger for the average computer user is that someone will hack their system. Most average computer users don’t have anything worth stealing. Now, on the internet, there are other dangers, because your computer could be a launching pad for other attacks. So people might want to break into your computer in order to use it later on as a tool to break into something bigger. These things happen all the time.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Gender In Cybersecurity

    • 973 Words
    • 4 Pages

    Gender Gap in Cybersecurity Cyberwarfare is now an integrated part of China’s military strategy according to the US Department of Defense. And in January 2010, Google announced that a major cyber attack from China had penetrated its corporate infrastructure and stolen information from its computers. This raises the awareness that cybersecurity have become an important role in national security. Cyber attack can be used in three major categories — economic, military and social adversaries. For example, China hacked into Gmail accounts of some human rights activists to strike social adversaries; Military concern is the most important in cybersecurity because hacking into the Pentagon can result in the leak of sensitive military deploy.…

    • 973 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    The aforementioned Stuxnet worm that delayed Iran’s nuclear capabilities by two years is used to support this claim. The author also supports this claim by claiming a cyber attack could potentially cripple an economy. Simply deleting data from banking systems could result in economic crisis. Harris cites an instance where the military planned to attack Iraq’s banking system prior to the 2003 invasion, however the military called off this plan because they feared the attack may accidentally spread to France’s banking system. This shows the nature of digital warfare is similar to that of physical warfare; an attack can have accidental effects on unintended targets.…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    What Is Cybercrime?

    • 858 Words
    • 4 Pages

    "Cybercrime" is a criminal offense committed to internet technology (cyberspace), whether it attacks public facilities in cyberspace or private ownership. Technically such crime can be distinguished into off-line crime, semi on-line crime, and cybercrime. Each has its own characteristics, but the main difference between the three is the relationship with the public information network (internet).cybercrime is formulated as an act against the law that is done by using a computer network as a means / tool or computer as an object, whether to gain profit or not, to the detriment of other parties. "Cyberstalking" means the use of the Internet or other electronic means to harass a person, group of persons, or an organization. Cyberstalking is the…

    • 858 Words
    • 4 Pages
    Improved Essays