Cyber Warfare Research Paper

Better Essays
“I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We 've created life in our own image.” (Hawking, n.d.) No matter what humans invent it will always end up being used for warfare and computers are no different. Cyber warfare is now commonplace throughout the world because just about any country can do it. This causes it to have many various effects throughout the world.
“Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems.” (Rouse, 2010) Not much is actually known about the effects of cyber warfare because most cases either go undiscovered or are seen as warnings. Some of the more well-known cyber-attacks are stuxnet, equation group, and most recently the Sony Pictures attack. All of these attacks had their reasons for happening, and have had far reaching effects on the world.
Saudi Arabia has long defended its oil lines from physical attacks. However, on August 15,
…show more content…
However, because the letter asked for money rather than political change it is believed that this group has nothing to do with later attacks. The first actual attack was from the “Guardians of Peace” and caused a neon skeleton to appear on several computers belonging to SPE. This attack also had the added benefit of completely erasing everything off of numerous hard drives. Then over the next several days the hackers started to release documents and information with several changes to shed SPE in a bad light. This took place over several weeks so that people would be constantly reminded of Sony’s “transgression.” Then as the movie was getting closer to its theatrical release is when the terrorist threats started to happen. It was because of these threats that most theaters decided to not show the movie. (Haggard & Lindsey,

Related Documents

  • Decent Essays

    Till then USA government did not have any idea that terrorist can destroy their economy drastically by simply hijacking the plane. After 9/11 attack, many government agencies like FBI, CIA have been involved with the ISAC and other internet organizations in order to save their data and transfer them to a safer location. Since then, USA removed all the information available on their government websites which could help the terrorists to plan attack similar to 9/11. They protected their database from public access and recovered the primary data. While the US from recovering from the financial losses from the 9/11 attack exactly after a week it was attacked by a virus referred as “Nimda” which is considered to be the widest spread virus worm among the internet.…

    • 1484 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Although, the primary issue Americans face are virus infecting the computers and hacking retrieving valuable data. d. The Illuminai is a well known secret society that as prospered for decades. Many aspects of this secret group remains silenced. This group has great influence on the government and media. Their messages are embedded with movies, music, t.v shows, and news.…

    • 1138 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Evolution Of Hacking

    • 1100 Words
    • 5 Pages

    The media has had various ideas of what a hacker is and does, and for the most part, they are right, in this current era at least. There are plenty of hacker groups today that hack many things like accounts, computers, companies, and even government agencies. These groups go by names such as Anonymous, Lizard Squad, The Level Seven Crew, and many other names. Although the media perceives these actions to be malicious these groups find these actions to be justifiable. By justifiable, we mean that these groups believe that what they are doing is good for society and good for their country.…

    • 1100 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    However, the hackers are always a step ahead of us. Is there a way to stop the hackers? Cybersecurity, as known as Computer Security, is the “method of protecting information, computer programs, and other computer system assets (“Computer Security”).” However, today is not only computers. According to my friend, Alex Cormier, who works at MassMutual in their IT department, all electronics are vulnerable to attacks. “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”.…

    • 1115 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want. “Only amateurs attack machines, professionals target people” (Gallagher) Introduction With cyberwarfare becoming a huge part of how nations and terror groups are…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Cyber Bullying is a worldwide thing that was made with the help of technology. Cyber Bullying takes many forms and every one of them is threatening. Some of the forms of cyberbullying are flaming, harassment, exclusion, and cyber stalking. Modern day technology allows for many people to threaten the lives of many innocent people in today’s world. On the contrary, technology does give people the simplicity they desire.…

    • 1102 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    This attack was not even carried out on U.S. soil, but still goes down as the biggest “breach of military networks” to date. What we now know as a program by the name of “agent.biz” is scripted to spread from one computer to every other computer in a certain network, just as the Shamoon virus was coded to do to Aramco. The agent.biz virus made its way into the American military networks by simple USB flash drive. It was never released how, but somehow the USB containing the virus was inserted into a computer on an American military base in the middle east. Once the virus made its way in it was able to get into the systems of U.S. Central Command.…

    • 1910 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Cybercriminal Crimes

    • 779 Words
    • 4 Pages

    This scheme involves criminals using “online dating sites” and “social networking sites” to con people out of some quick cash (Whitty and Buchanan 182). All cybercriminals are not interested in individuals and businesses. Certain cybercriminals have even gone after satellites and military launch codes (Iozzio). These cybercriminals often get away with their crimes. According to Steve Head, UK’s former national coordinator for economic crime “about three million offences are going unreported each year” (“Cyber crime is a bigger threat”).…

    • 779 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    When it comes to our national security, there are many threats. For instance, some may believe that biological weapons are the biggest threat, while others feel transnational crimes are. In my opinion, though, I believe that cyber-attacks are our biggest threat when it comes to national security. Cyber-crime, as well as cyber terrorism proceeds to be the most accelerated threat to citizens of the United States. Our digital foundation is so accessible when it comes to being attacked which is just one of the reasons why it is more crucial than ever before that we keep ourselves, as well as our personal data safe from the exceeding danger of hackers (Nozzolio, 2015).…

    • 1118 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Cyberbullying In America

    • 1211 Words
    • 5 Pages

    As a first world country, the laws in place to protect victims and punish aggressors is despicable and needs to be changed. In a world consumed by technology, the act of cyberbullying is incredibly common and unfortunately incredibly damaging. Associated with mental health conditions such as depression and anxiety, America is leaving their citizens helpless with no support, and unintentionally encouraging the cowardice act of cyberbullying. Furthermore, powerful American leaders have most recently been instigators of cyberbullying and therefore provide bad examples to the American population. Filled with vicious, derogatory tweets President Donald Trump has proved to be a very powerful cyberbully, sharing his shaded opinion widely over the internationally linked social site of Twitter.…

    • 1211 Words
    • 5 Pages
    Decent Essays