Although it has already taken a number of steps to encourage their use, could still be doing more. According to another source, infiltration by criminals into a building and installing viruses or tampering with hardware is one of the most effective forms of cyber warfare because it bypasses many of the most popular and contemporary defenses against it (Whitman 2003). That is to say, this more direct and assertive form of cyber warfare method is able to ignore even many anti-virus efforts, and this means that there needs to be more and more attention devoted to stopping alternative methods that are not linked entirely to cyber …show more content…
There are a large number of individual components within cyberspace to be managed entirely by the USIC, and this naturally leads to situations where cyber warfare can be disseminated that much more easily. This concept is one that is mentioned by another source, which finds that there is a sort of postmodernist terrorism, which exceeds the previous examples that existed within terrorism, which were focused much more on affiliation within a specific organization, and can affect change directly, not just through proxies, although the latter is still a popular choice for many cyber warfare mongers (Janczewski 2007). This means that the face of cyber warfare is seeing a large number of businesses, and even militaries, in some cases, seeing the fight brought to them, so to speak, in a manner that they have not seen before (Janczewski